Apr 12 20:35:55.547485 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 20:35:55.547498 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:35:55.547505 kernel: BIOS-provided physical RAM map: Apr 12 20:35:55.547509 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 20:35:55.547513 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 20:35:55.547517 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 20:35:55.547521 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 20:35:55.547525 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 20:35:55.547529 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820e1fff] usable Apr 12 20:35:55.547533 kernel: BIOS-e820: [mem 0x00000000820e2000-0x00000000820e2fff] ACPI NVS Apr 12 20:35:55.547538 kernel: BIOS-e820: [mem 0x00000000820e3000-0x00000000820e3fff] reserved Apr 12 20:35:55.547542 kernel: BIOS-e820: [mem 0x00000000820e4000-0x000000008afccfff] usable Apr 12 20:35:55.547546 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Apr 12 20:35:55.547550 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Apr 12 20:35:55.547555 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Apr 12 20:35:55.547560 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Apr 12 20:35:55.547565 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Apr 12 20:35:55.547569 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Apr 12 20:35:55.547573 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 20:35:55.547578 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 20:35:55.547582 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 20:35:55.547586 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 20:35:55.547591 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 20:35:55.547595 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Apr 12 20:35:55.547599 kernel: NX (Execute Disable) protection: active Apr 12 20:35:55.547603 kernel: SMBIOS 3.2.1 present. Apr 12 20:35:55.547609 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Apr 12 20:35:55.547613 kernel: tsc: Detected 3400.000 MHz processor Apr 12 20:35:55.547618 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 20:35:55.547622 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 20:35:55.547627 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 20:35:55.547632 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Apr 12 20:35:55.547636 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 20:35:55.547641 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Apr 12 20:35:55.547645 kernel: Using GB pages for direct mapping Apr 12 20:35:55.547650 kernel: ACPI: Early table checksum verification disabled Apr 12 20:35:55.547655 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 20:35:55.547659 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 20:35:55.547664 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Apr 12 20:35:55.547669 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 20:35:55.547675 kernel: ACPI: FACS 0x000000008C66CF80 000040 Apr 12 20:35:55.547680 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Apr 12 20:35:55.547686 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Apr 12 20:35:55.547691 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 20:35:55.547695 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 20:35:55.547700 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 20:35:55.547705 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 20:35:55.547710 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 20:35:55.547715 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 20:35:55.547720 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:35:55.547725 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 20:35:55.547730 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 20:35:55.547735 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:35:55.547740 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:35:55.547745 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 20:35:55.547750 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 20:35:55.547755 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:35:55.547759 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:35:55.547765 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 20:35:55.547770 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Apr 12 20:35:55.547775 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 20:35:55.547780 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 20:35:55.547785 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 20:35:55.547790 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Apr 12 20:35:55.547794 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 20:35:55.547799 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 20:35:55.547804 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 20:35:55.547810 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 20:35:55.547815 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 20:35:55.547820 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Apr 12 20:35:55.547824 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Apr 12 20:35:55.547829 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Apr 12 20:35:55.547834 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Apr 12 20:35:55.547839 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Apr 12 20:35:55.547844 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Apr 12 20:35:55.547849 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Apr 12 20:35:55.547854 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Apr 12 20:35:55.547859 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Apr 12 20:35:55.547864 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Apr 12 20:35:55.547869 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Apr 12 20:35:55.547874 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Apr 12 20:35:55.547879 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Apr 12 20:35:55.547883 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Apr 12 20:35:55.547888 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Apr 12 20:35:55.547894 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Apr 12 20:35:55.547899 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Apr 12 20:35:55.547904 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Apr 12 20:35:55.547909 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Apr 12 20:35:55.547914 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Apr 12 20:35:55.547919 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Apr 12 20:35:55.547923 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Apr 12 20:35:55.547928 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Apr 12 20:35:55.547933 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Apr 12 20:35:55.547939 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Apr 12 20:35:55.547944 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Apr 12 20:35:55.547948 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Apr 12 20:35:55.547953 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Apr 12 20:35:55.547958 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Apr 12 20:35:55.547963 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Apr 12 20:35:55.547968 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Apr 12 20:35:55.547973 kernel: No NUMA configuration found Apr 12 20:35:55.547978 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Apr 12 20:35:55.547984 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Apr 12 20:35:55.547989 kernel: Zone ranges: Apr 12 20:35:55.547994 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 20:35:55.547999 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 20:35:55.548004 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Apr 12 20:35:55.548008 kernel: Movable zone start for each node Apr 12 20:35:55.548013 kernel: Early memory node ranges Apr 12 20:35:55.548018 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 20:35:55.548023 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 20:35:55.548028 kernel: node 0: [mem 0x0000000040400000-0x00000000820e1fff] Apr 12 20:35:55.548034 kernel: node 0: [mem 0x00000000820e4000-0x000000008afccfff] Apr 12 20:35:55.548038 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Apr 12 20:35:55.548043 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Apr 12 20:35:55.548048 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Apr 12 20:35:55.548053 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Apr 12 20:35:55.548058 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 20:35:55.548066 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 20:35:55.548072 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 20:35:55.548077 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 20:35:55.548083 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Apr 12 20:35:55.548089 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Apr 12 20:35:55.548094 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Apr 12 20:35:55.548099 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Apr 12 20:35:55.548105 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 20:35:55.548110 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 20:35:55.548115 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 20:35:55.548120 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 20:35:55.548126 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 20:35:55.548131 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 20:35:55.548137 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 20:35:55.548142 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 20:35:55.548147 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 20:35:55.548152 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 20:35:55.548157 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 20:35:55.548163 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 20:35:55.548168 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 20:35:55.548174 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 20:35:55.548179 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 20:35:55.548184 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 20:35:55.548189 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 20:35:55.548194 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 20:35:55.548200 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 20:35:55.548205 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 20:35:55.548210 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 20:35:55.548215 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 20:35:55.548221 kernel: TSC deadline timer available Apr 12 20:35:55.548227 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 20:35:55.548232 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Apr 12 20:35:55.548237 kernel: Booting paravirtualized kernel on bare hardware Apr 12 20:35:55.548242 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 20:35:55.548248 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 20:35:55.548253 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 20:35:55.548258 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 20:35:55.548263 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 20:35:55.548269 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Apr 12 20:35:55.548274 kernel: Policy zone: Normal Apr 12 20:35:55.548280 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:35:55.548285 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 20:35:55.548291 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 20:35:55.548296 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 20:35:55.548303 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 20:35:55.548326 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 730116K reserved, 0K cma-reserved) Apr 12 20:35:55.548332 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 20:35:55.548337 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 20:35:55.548343 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 20:35:55.548348 kernel: rcu: Hierarchical RCU implementation. Apr 12 20:35:55.548354 kernel: rcu: RCU event tracing is enabled. Apr 12 20:35:55.548359 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 20:35:55.548378 kernel: Rude variant of Tasks RCU enabled. Apr 12 20:35:55.548384 kernel: Tracing variant of Tasks RCU enabled. Apr 12 20:35:55.548389 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 20:35:55.548395 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 20:35:55.548400 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 20:35:55.548405 kernel: random: crng init done Apr 12 20:35:55.548410 kernel: Console: colour dummy device 80x25 Apr 12 20:35:55.548416 kernel: printk: console [tty0] enabled Apr 12 20:35:55.548421 kernel: printk: console [ttyS1] enabled Apr 12 20:35:55.548426 kernel: ACPI: Core revision 20210730 Apr 12 20:35:55.548431 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Apr 12 20:35:55.548437 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 20:35:55.548443 kernel: DMAR: Host address width 39 Apr 12 20:35:55.548448 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 20:35:55.548453 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 20:35:55.548458 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Apr 12 20:35:55.548463 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Apr 12 20:35:55.548469 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 20:35:55.548474 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 20:35:55.548479 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 20:35:55.548484 kernel: x2apic enabled Apr 12 20:35:55.548490 kernel: Switched APIC routing to cluster x2apic. Apr 12 20:35:55.548496 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 20:35:55.548501 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 20:35:55.548506 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 20:35:55.548511 kernel: process: using mwait in idle threads Apr 12 20:35:55.548516 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 20:35:55.548522 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 20:35:55.548527 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 20:35:55.548532 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 20:35:55.548538 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 20:35:55.548543 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 20:35:55.548548 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 20:35:55.548554 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 20:35:55.548559 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 20:35:55.548564 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 20:35:55.548569 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 20:35:55.548574 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 20:35:55.548579 kernel: TAA: Mitigation: TSX disabled Apr 12 20:35:55.548584 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 20:35:55.548590 kernel: SRBDS: Mitigation: Microcode Apr 12 20:35:55.548595 kernel: GDS: Vulnerable: No microcode Apr 12 20:35:55.548601 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 20:35:55.548606 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 20:35:55.548611 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 20:35:55.548616 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 20:35:55.548621 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 20:35:55.548626 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 20:35:55.548631 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 20:35:55.548637 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 20:35:55.548642 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 20:35:55.548647 kernel: Freeing SMP alternatives memory: 32K Apr 12 20:35:55.548653 kernel: pid_max: default: 32768 minimum: 301 Apr 12 20:35:55.548658 kernel: LSM: Security Framework initializing Apr 12 20:35:55.548663 kernel: SELinux: Initializing. Apr 12 20:35:55.548668 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:35:55.548673 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:35:55.548679 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 20:35:55.548684 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 20:35:55.548689 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 20:35:55.548694 kernel: ... version: 4 Apr 12 20:35:55.548699 kernel: ... bit width: 48 Apr 12 20:35:55.548705 kernel: ... generic registers: 4 Apr 12 20:35:55.548711 kernel: ... value mask: 0000ffffffffffff Apr 12 20:35:55.548716 kernel: ... max period: 00007fffffffffff Apr 12 20:35:55.548721 kernel: ... fixed-purpose events: 3 Apr 12 20:35:55.548726 kernel: ... event mask: 000000070000000f Apr 12 20:35:55.548731 kernel: signal: max sigframe size: 2032 Apr 12 20:35:55.548736 kernel: rcu: Hierarchical SRCU implementation. Apr 12 20:35:55.548742 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 20:35:55.548747 kernel: smp: Bringing up secondary CPUs ... Apr 12 20:35:55.548752 kernel: x86: Booting SMP configuration: Apr 12 20:35:55.548758 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 20:35:55.548763 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 20:35:55.548769 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 20:35:55.548774 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 20:35:55.548779 kernel: smpboot: Max logical packages: 1 Apr 12 20:35:55.548784 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 20:35:55.548789 kernel: devtmpfs: initialized Apr 12 20:35:55.548795 kernel: x86/mm: Memory block size: 128MB Apr 12 20:35:55.548800 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820e2000-0x820e2fff] (4096 bytes) Apr 12 20:35:55.548806 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Apr 12 20:35:55.548811 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 20:35:55.548816 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 20:35:55.548821 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 20:35:55.548827 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 20:35:55.548832 kernel: audit: initializing netlink subsys (disabled) Apr 12 20:35:55.548837 kernel: audit: type=2000 audit(1712954150.041:1): state=initialized audit_enabled=0 res=1 Apr 12 20:35:55.548842 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 20:35:55.548847 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 20:35:55.548853 kernel: cpuidle: using governor menu Apr 12 20:35:55.548859 kernel: ACPI: bus type PCI registered Apr 12 20:35:55.548864 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 20:35:55.548869 kernel: dca service started, version 1.12.1 Apr 12 20:35:55.548874 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 20:35:55.548880 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 20:35:55.548885 kernel: PCI: Using configuration type 1 for base access Apr 12 20:35:55.548890 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 20:35:55.548895 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 20:35:55.548901 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 20:35:55.548906 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 20:35:55.548912 kernel: ACPI: Added _OSI(Module Device) Apr 12 20:35:55.548917 kernel: ACPI: Added _OSI(Processor Device) Apr 12 20:35:55.548922 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 20:35:55.548927 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 20:35:55.548932 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 20:35:55.548937 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 20:35:55.548943 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 20:35:55.548949 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 20:35:55.548954 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:35:55.548959 kernel: ACPI: SSDT 0xFFFF99F5C0220600 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 20:35:55.548964 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 20:35:55.548970 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:35:55.548975 kernel: ACPI: SSDT 0xFFFF99F5C1AED400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 20:35:55.548980 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:35:55.548985 kernel: ACPI: SSDT 0xFFFF99F5C1A65000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 20:35:55.548990 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:35:55.548996 kernel: ACPI: SSDT 0xFFFF99F5C1B50800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 20:35:55.549001 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:35:55.549006 kernel: ACPI: SSDT 0xFFFF99F5C0155000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 20:35:55.549012 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:35:55.549017 kernel: ACPI: SSDT 0xFFFF99F5C1AEF400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 20:35:55.549022 kernel: ACPI: Interpreter enabled Apr 12 20:35:55.549027 kernel: ACPI: PM: (supports S0 S5) Apr 12 20:35:55.549032 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 20:35:55.549038 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 20:35:55.549043 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 20:35:55.549049 kernel: HEST: Table parsing has been initialized. Apr 12 20:35:55.549054 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 20:35:55.549059 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 20:35:55.549065 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 20:35:55.549070 kernel: ACPI: PM: Power Resource [USBC] Apr 12 20:35:55.549075 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 20:35:55.549080 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 20:35:55.549085 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 20:35:55.549090 kernel: ACPI: PM: Power Resource [WRST] Apr 12 20:35:55.549096 kernel: ACPI: PM: Power Resource [FN00] Apr 12 20:35:55.549101 kernel: ACPI: PM: Power Resource [FN01] Apr 12 20:35:55.549107 kernel: ACPI: PM: Power Resource [FN02] Apr 12 20:35:55.549112 kernel: ACPI: PM: Power Resource [FN03] Apr 12 20:35:55.549117 kernel: ACPI: PM: Power Resource [FN04] Apr 12 20:35:55.549122 kernel: ACPI: PM: Power Resource [PIN] Apr 12 20:35:55.549127 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 20:35:55.549191 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:35:55.549239 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 20:35:55.549280 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 20:35:55.549287 kernel: PCI host bridge to bus 0000:00 Apr 12 20:35:55.549354 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 20:35:55.549408 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 20:35:55.549445 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 20:35:55.549482 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Apr 12 20:35:55.549520 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 20:35:55.549557 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 20:35:55.549607 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 20:35:55.549658 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 20:35:55.549702 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.549748 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 20:35:55.549793 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Apr 12 20:35:55.549840 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 20:35:55.549883 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Apr 12 20:35:55.549929 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 20:35:55.549972 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Apr 12 20:35:55.550016 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 20:35:55.550063 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 20:35:55.550107 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Apr 12 20:35:55.550148 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Apr 12 20:35:55.550194 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 20:35:55.550236 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:35:55.550284 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 20:35:55.550346 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:35:55.550407 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 20:35:55.550448 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Apr 12 20:35:55.550489 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 20:35:55.550534 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 20:35:55.550577 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Apr 12 20:35:55.550618 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 20:35:55.550664 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 20:35:55.550707 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Apr 12 20:35:55.550747 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 20:35:55.550792 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 20:35:55.550834 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Apr 12 20:35:55.550877 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Apr 12 20:35:55.550924 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Apr 12 20:35:55.550969 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Apr 12 20:35:55.551010 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Apr 12 20:35:55.551052 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Apr 12 20:35:55.551092 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 20:35:55.551138 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 20:35:55.551180 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.551229 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 20:35:55.551273 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.551339 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 20:35:55.551399 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.551446 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 20:35:55.551488 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.551535 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Apr 12 20:35:55.551579 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.551625 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 20:35:55.551668 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:35:55.551715 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 20:35:55.551760 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 20:35:55.551802 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Apr 12 20:35:55.551844 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 20:35:55.551891 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 20:35:55.551933 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 20:35:55.551983 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 20:35:55.552027 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 20:35:55.552071 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Apr 12 20:35:55.552113 kernel: pci 0000:01:00.0: PME# supported from D3cold Apr 12 20:35:55.552158 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:35:55.552201 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:35:55.552250 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 20:35:55.552295 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 20:35:55.552385 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Apr 12 20:35:55.552429 kernel: pci 0000:01:00.1: PME# supported from D3cold Apr 12 20:35:55.552472 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:35:55.552516 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:35:55.552558 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:35:55.552601 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 20:35:55.552645 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:35:55.552688 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 20:35:55.552735 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Apr 12 20:35:55.552780 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:35:55.552823 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Apr 12 20:35:55.552866 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 20:35:55.552908 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Apr 12 20:35:55.552952 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.552996 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 20:35:55.553037 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:35:55.553112 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 20:35:55.553180 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 20:35:55.553224 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:35:55.553267 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Apr 12 20:35:55.553332 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 20:35:55.553397 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Apr 12 20:35:55.553441 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:35:55.553483 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 20:35:55.553526 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:35:55.553568 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 20:35:55.553610 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 20:35:55.553659 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 20:35:55.553703 kernel: pci 0000:06:00.0: enabling Extended Tags Apr 12 20:35:55.553748 kernel: pci 0000:06:00.0: supports D1 D2 Apr 12 20:35:55.553792 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:35:55.553835 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 20:35:55.553876 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 20:35:55.553919 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:35:55.553967 kernel: pci_bus 0000:07: extended config space not accessible Apr 12 20:35:55.554018 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 20:35:55.554066 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Apr 12 20:35:55.554113 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Apr 12 20:35:55.554157 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 20:35:55.554203 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 20:35:55.554248 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 20:35:55.554294 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:35:55.554381 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 20:35:55.554426 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:35:55.554470 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:35:55.554478 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 20:35:55.554485 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 20:35:55.554491 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 20:35:55.554497 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 20:35:55.554502 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 20:35:55.554508 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 20:35:55.554513 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 20:35:55.554520 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 20:35:55.554525 kernel: iommu: Default domain type: Translated Apr 12 20:35:55.554531 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 20:35:55.554575 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Apr 12 20:35:55.554621 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 20:35:55.554667 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Apr 12 20:35:55.554675 kernel: vgaarb: loaded Apr 12 20:35:55.554681 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 20:35:55.554687 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 20:35:55.554694 kernel: PTP clock support registered Apr 12 20:35:55.554699 kernel: PCI: Using ACPI for IRQ routing Apr 12 20:35:55.554706 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 20:35:55.554711 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 20:35:55.554716 kernel: e820: reserve RAM buffer [mem 0x820e2000-0x83ffffff] Apr 12 20:35:55.554722 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Apr 12 20:35:55.554727 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Apr 12 20:35:55.554733 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Apr 12 20:35:55.554739 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Apr 12 20:35:55.554744 kernel: clocksource: Switched to clocksource tsc-early Apr 12 20:35:55.554750 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 20:35:55.554755 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 20:35:55.554761 kernel: pnp: PnP ACPI init Apr 12 20:35:55.554805 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 20:35:55.554848 kernel: pnp 00:02: [dma 0 disabled] Apr 12 20:35:55.554890 kernel: pnp 00:03: [dma 0 disabled] Apr 12 20:35:55.554935 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 20:35:55.554974 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 20:35:55.555015 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 20:35:55.555057 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 20:35:55.555094 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 20:35:55.555131 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 20:35:55.555172 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 20:35:55.555209 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 20:35:55.555247 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 20:35:55.555285 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 20:35:55.555350 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 20:35:55.555411 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 20:35:55.555448 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 20:35:55.555489 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 20:35:55.555526 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 20:35:55.555564 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 20:35:55.555602 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 20:35:55.555641 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 20:35:55.555682 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 20:35:55.555690 kernel: pnp: PnP ACPI: found 10 devices Apr 12 20:35:55.555697 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 20:35:55.555703 kernel: NET: Registered PF_INET protocol family Apr 12 20:35:55.555709 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:35:55.555715 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 20:35:55.555720 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 20:35:55.555726 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:35:55.555731 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 20:35:55.555737 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 20:35:55.555743 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:35:55.555749 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:35:55.555755 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 20:35:55.555760 kernel: NET: Registered PF_XDP protocol family Apr 12 20:35:55.555803 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Apr 12 20:35:55.555846 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Apr 12 20:35:55.555887 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Apr 12 20:35:55.555933 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:35:55.555979 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:35:55.556025 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:35:55.556068 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:35:55.556111 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:35:55.556154 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 20:35:55.556197 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:35:55.556239 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 20:35:55.556283 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 20:35:55.556350 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:35:55.556406 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 20:35:55.556448 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 20:35:55.556491 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:35:55.556533 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 20:35:55.556575 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 20:35:55.556620 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 20:35:55.556664 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:35:55.556707 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:35:55.556749 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 20:35:55.556791 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 20:35:55.556834 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 20:35:55.556872 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 20:35:55.556910 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 20:35:55.556948 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 20:35:55.556986 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 20:35:55.557023 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Apr 12 20:35:55.557059 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 20:35:55.557104 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Apr 12 20:35:55.557145 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:35:55.557190 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Apr 12 20:35:55.557231 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Apr 12 20:35:55.557275 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Apr 12 20:35:55.557340 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Apr 12 20:35:55.557402 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Apr 12 20:35:55.557442 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Apr 12 20:35:55.557483 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 20:35:55.557525 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Apr 12 20:35:55.557534 kernel: PCI: CLS 64 bytes, default 64 Apr 12 20:35:55.557540 kernel: DMAR: No ATSR found Apr 12 20:35:55.557545 kernel: DMAR: No SATC found Apr 12 20:35:55.557551 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 20:35:55.557593 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 20:35:55.557636 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 20:35:55.557679 kernel: pci 0000:00:08.0: Adding to iommu group 2 Apr 12 20:35:55.557721 kernel: pci 0000:00:12.0: Adding to iommu group 3 Apr 12 20:35:55.557765 kernel: pci 0000:00:14.0: Adding to iommu group 4 Apr 12 20:35:55.557808 kernel: pci 0000:00:14.2: Adding to iommu group 4 Apr 12 20:35:55.557850 kernel: pci 0000:00:15.0: Adding to iommu group 5 Apr 12 20:35:55.557891 kernel: pci 0000:00:15.1: Adding to iommu group 5 Apr 12 20:35:55.557933 kernel: pci 0000:00:16.0: Adding to iommu group 6 Apr 12 20:35:55.557974 kernel: pci 0000:00:16.1: Adding to iommu group 6 Apr 12 20:35:55.558016 kernel: pci 0000:00:16.4: Adding to iommu group 6 Apr 12 20:35:55.558057 kernel: pci 0000:00:17.0: Adding to iommu group 7 Apr 12 20:35:55.558099 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Apr 12 20:35:55.558143 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Apr 12 20:35:55.558186 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Apr 12 20:35:55.558228 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Apr 12 20:35:55.558270 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Apr 12 20:35:55.558337 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Apr 12 20:35:55.558393 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Apr 12 20:35:55.558435 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Apr 12 20:35:55.558478 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Apr 12 20:35:55.558523 kernel: pci 0000:01:00.0: Adding to iommu group 1 Apr 12 20:35:55.558567 kernel: pci 0000:01:00.1: Adding to iommu group 1 Apr 12 20:35:55.558611 kernel: pci 0000:03:00.0: Adding to iommu group 15 Apr 12 20:35:55.558655 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 20:35:55.558699 kernel: pci 0000:06:00.0: Adding to iommu group 17 Apr 12 20:35:55.558745 kernel: pci 0000:07:00.0: Adding to iommu group 17 Apr 12 20:35:55.558753 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 20:35:55.558759 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 20:35:55.558766 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Apr 12 20:35:55.558772 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Apr 12 20:35:55.558777 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 20:35:55.558783 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 20:35:55.558789 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 20:35:55.558833 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 20:35:55.558841 kernel: Initialise system trusted keyrings Apr 12 20:35:55.558847 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 20:35:55.558854 kernel: Key type asymmetric registered Apr 12 20:35:55.558859 kernel: Asymmetric key parser 'x509' registered Apr 12 20:35:55.558865 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 20:35:55.558870 kernel: io scheduler mq-deadline registered Apr 12 20:35:55.558876 kernel: io scheduler kyber registered Apr 12 20:35:55.558882 kernel: io scheduler bfq registered Apr 12 20:35:55.558925 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Apr 12 20:35:55.558968 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Apr 12 20:35:55.559012 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Apr 12 20:35:55.559056 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Apr 12 20:35:55.559098 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Apr 12 20:35:55.559141 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Apr 12 20:35:55.559188 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 20:35:55.559196 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 20:35:55.559202 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 20:35:55.559207 kernel: pstore: Registered erst as persistent store backend Apr 12 20:35:55.559214 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 20:35:55.559220 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 20:35:55.559226 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 20:35:55.559231 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 20:35:55.559237 kernel: hpet_acpi_add: no address or irqs in _CRS Apr 12 20:35:55.559282 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 20:35:55.559291 kernel: i8042: PNP: No PS/2 controller found. Apr 12 20:35:55.559372 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 20:35:55.559414 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 20:35:55.559453 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T20:35:54 UTC (1712954154) Apr 12 20:35:55.559491 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 20:35:55.559499 kernel: fail to initialize ptp_kvm Apr 12 20:35:55.559504 kernel: intel_pstate: Intel P-state driver initializing Apr 12 20:35:55.559510 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 20:35:55.559515 kernel: intel_pstate: HWP enabled Apr 12 20:35:55.559521 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 20:35:55.559527 kernel: vesafb: scrolling: redraw Apr 12 20:35:55.559533 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 20:35:55.559539 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000007dcb510f, using 768k, total 768k Apr 12 20:35:55.559545 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 20:35:55.559550 kernel: fb0: VESA VGA frame buffer device Apr 12 20:35:55.559556 kernel: NET: Registered PF_INET6 protocol family Apr 12 20:35:55.559561 kernel: Segment Routing with IPv6 Apr 12 20:35:55.559567 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 20:35:55.559573 kernel: NET: Registered PF_PACKET protocol family Apr 12 20:35:55.559578 kernel: Key type dns_resolver registered Apr 12 20:35:55.559585 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 20:35:55.559590 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 20:35:55.559596 kernel: IPI shorthand broadcast: enabled Apr 12 20:35:55.559601 kernel: sched_clock: Marking stable (1681740509, 1339849198)->(4466019508, -1444429801) Apr 12 20:35:55.559607 kernel: registered taskstats version 1 Apr 12 20:35:55.559612 kernel: Loading compiled-in X.509 certificates Apr 12 20:35:55.559618 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 20:35:55.559623 kernel: Key type .fscrypt registered Apr 12 20:35:55.559629 kernel: Key type fscrypt-provisioning registered Apr 12 20:35:55.559636 kernel: pstore: Using crash dump compression: deflate Apr 12 20:35:55.559641 kernel: ima: Allocated hash algorithm: sha1 Apr 12 20:35:55.559647 kernel: ima: No architecture policies found Apr 12 20:35:55.559652 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 20:35:55.559658 kernel: Write protecting the kernel read-only data: 28672k Apr 12 20:35:55.559664 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 20:35:55.559669 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 20:35:55.559675 kernel: Run /init as init process Apr 12 20:35:55.559680 kernel: with arguments: Apr 12 20:35:55.559687 kernel: /init Apr 12 20:35:55.559692 kernel: with environment: Apr 12 20:35:55.559698 kernel: HOME=/ Apr 12 20:35:55.559703 kernel: TERM=linux Apr 12 20:35:55.559708 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 20:35:55.559715 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:35:55.559722 systemd[1]: Detected architecture x86-64. Apr 12 20:35:55.559729 systemd[1]: Running in initrd. Apr 12 20:35:55.559734 systemd[1]: No hostname configured, using default hostname. Apr 12 20:35:55.559739 systemd[1]: Hostname set to . Apr 12 20:35:55.559745 systemd[1]: Initializing machine ID from random generator. Apr 12 20:35:55.559751 systemd[1]: Queued start job for default target initrd.target. Apr 12 20:35:55.559756 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:35:55.559761 systemd[1]: Reached target cryptsetup.target. Apr 12 20:35:55.559767 systemd[1]: Reached target paths.target. Apr 12 20:35:55.559773 systemd[1]: Reached target slices.target. Apr 12 20:35:55.559779 systemd[1]: Reached target swap.target. Apr 12 20:35:55.559784 systemd[1]: Reached target timers.target. Apr 12 20:35:55.559789 systemd[1]: Listening on iscsid.socket. Apr 12 20:35:55.559795 systemd[1]: Listening on iscsiuio.socket. Apr 12 20:35:55.559801 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 20:35:55.559806 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 20:35:55.559812 systemd[1]: Listening on systemd-journald.socket. Apr 12 20:35:55.559818 kernel: tsc: Refined TSC clocksource calibration: 3408.000 MHz Apr 12 20:35:55.559824 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:35:55.559829 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Apr 12 20:35:55.559835 kernel: clocksource: Switched to clocksource tsc Apr 12 20:35:55.559841 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:35:55.559846 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:35:55.559852 systemd[1]: Reached target sockets.target. Apr 12 20:35:55.559857 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:35:55.559863 systemd[1]: Finished network-cleanup.service. Apr 12 20:35:55.559869 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 20:35:55.559875 systemd[1]: Starting systemd-journald.service... Apr 12 20:35:55.559880 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:35:55.559888 systemd-journald[267]: Journal started Apr 12 20:35:55.559914 systemd-journald[267]: Runtime Journal (/run/log/journal/6a85dcb79dba4f2dbcce65712953beb5) is 8.0M, max 640.1M, 632.1M free. Apr 12 20:35:55.561953 systemd-modules-load[268]: Inserted module 'overlay' Apr 12 20:35:55.591751 kernel: audit: type=1334 audit(1712954155.568:2): prog-id=6 op=LOAD Apr 12 20:35:55.591762 systemd[1]: Starting systemd-resolved.service... Apr 12 20:35:55.568000 audit: BPF prog-id=6 op=LOAD Apr 12 20:35:55.636308 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 20:35:55.636325 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 20:35:55.670345 kernel: Bridge firewalling registered Apr 12 20:35:55.670393 systemd[1]: Started systemd-journald.service. Apr 12 20:35:55.684916 systemd-modules-load[268]: Inserted module 'br_netfilter' Apr 12 20:35:55.735555 kernel: audit: type=1130 audit(1712954155.693:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.687545 systemd-resolved[270]: Positive Trust Anchors: Apr 12 20:35:55.811490 kernel: SCSI subsystem initialized Apr 12 20:35:55.811503 kernel: audit: type=1130 audit(1712954155.747:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.811511 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 20:35:55.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.687550 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:35:55.912118 kernel: device-mapper: uevent: version 1.0.3 Apr 12 20:35:55.912129 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 20:35:55.912154 kernel: audit: type=1130 audit(1712954155.869:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.687569 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:35:55.987569 kernel: audit: type=1130 audit(1712954155.921:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.689133 systemd-resolved[270]: Defaulting to hostname 'linux'. Apr 12 20:35:55.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.693609 systemd[1]: Started systemd-resolved.service. Apr 12 20:35:56.096923 kernel: audit: type=1130 audit(1712954155.997:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.096935 kernel: audit: type=1130 audit(1712954156.050:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:55.747496 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:35:55.869657 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 20:35:55.912549 systemd-modules-load[268]: Inserted module 'dm_multipath' Apr 12 20:35:55.921622 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:35:55.997687 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 20:35:56.050611 systemd[1]: Reached target nss-lookup.target. Apr 12 20:35:56.105920 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 20:35:56.125859 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:35:56.126158 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:35:56.129100 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:35:56.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.129846 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:35:56.178387 kernel: audit: type=1130 audit(1712954156.128:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.191664 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 20:35:56.258407 kernel: audit: type=1130 audit(1712954156.191:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.249921 systemd[1]: Starting dracut-cmdline.service... Apr 12 20:35:56.272415 dracut-cmdline[292]: dracut-dracut-053 Apr 12 20:35:56.272415 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 20:35:56.272415 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:35:56.339374 kernel: Loading iSCSI transport class v2.0-870. Apr 12 20:35:56.339387 kernel: iscsi: registered transport (tcp) Apr 12 20:35:56.394902 kernel: iscsi: registered transport (qla4xxx) Apr 12 20:35:56.394921 kernel: QLogic iSCSI HBA Driver Apr 12 20:35:56.411178 systemd[1]: Finished dracut-cmdline.service. Apr 12 20:35:56.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:56.411743 systemd[1]: Starting dracut-pre-udev.service... Apr 12 20:35:56.466377 kernel: raid6: avx2x4 gen() 48952 MB/s Apr 12 20:35:56.502374 kernel: raid6: avx2x4 xor() 20775 MB/s Apr 12 20:35:56.538373 kernel: raid6: avx2x2 gen() 52470 MB/s Apr 12 20:35:56.573367 kernel: raid6: avx2x2 xor() 31354 MB/s Apr 12 20:35:56.608372 kernel: raid6: avx2x1 gen() 45269 MB/s Apr 12 20:35:56.642339 kernel: raid6: avx2x1 xor() 27911 MB/s Apr 12 20:35:56.676377 kernel: raid6: sse2x4 gen() 21367 MB/s Apr 12 20:35:56.710372 kernel: raid6: sse2x4 xor() 11975 MB/s Apr 12 20:35:56.744375 kernel: raid6: sse2x2 gen() 21662 MB/s Apr 12 20:35:56.778372 kernel: raid6: sse2x2 xor() 13390 MB/s Apr 12 20:35:56.812376 kernel: raid6: sse2x1 gen() 18313 MB/s Apr 12 20:35:56.863903 kernel: raid6: sse2x1 xor() 8923 MB/s Apr 12 20:35:56.863919 kernel: raid6: using algorithm avx2x2 gen() 52470 MB/s Apr 12 20:35:56.863927 kernel: raid6: .... xor() 31354 MB/s, rmw enabled Apr 12 20:35:56.881934 kernel: raid6: using avx2x2 recovery algorithm Apr 12 20:35:56.927314 kernel: xor: automatically using best checksumming function avx Apr 12 20:35:57.005343 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 20:35:57.010672 systemd[1]: Finished dracut-pre-udev.service. Apr 12 20:35:57.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:57.020000 audit: BPF prog-id=7 op=LOAD Apr 12 20:35:57.020000 audit: BPF prog-id=8 op=LOAD Apr 12 20:35:57.021288 systemd[1]: Starting systemd-udevd.service... Apr 12 20:35:57.028827 systemd-udevd[471]: Using default interface naming scheme 'v252'. Apr 12 20:35:57.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:57.035859 systemd[1]: Started systemd-udevd.service. Apr 12 20:35:57.074420 dracut-pre-trigger[482]: rd.md=0: removing MD RAID activation Apr 12 20:35:57.052316 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 20:35:57.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:57.080218 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 20:35:57.091207 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:35:57.141586 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:35:57.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:57.175313 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 20:35:57.177308 kernel: libata version 3.00 loaded. Apr 12 20:35:57.177334 kernel: ACPI: bus type USB registered Apr 12 20:35:57.194317 kernel: usbcore: registered new interface driver usbfs Apr 12 20:35:57.212311 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 20:35:57.229349 kernel: usbcore: registered new interface driver hub Apr 12 20:35:57.264291 kernel: usbcore: registered new device driver usb Apr 12 20:35:57.281308 kernel: AES CTR mode by8 optimization enabled Apr 12 20:35:57.281329 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 20:35:57.319020 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 20:35:57.319043 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Apr 12 20:35:57.319126 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 20:35:57.319136 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 20:35:57.373351 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:35:57.373438 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Apr 12 20:35:57.373497 kernel: pps pps0: new PPS source ptp0 Apr 12 20:35:57.373557 kernel: igb 0000:03:00.0: added PHC on eth0 Apr 12 20:35:57.373614 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:35:57.373668 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f1:0a Apr 12 20:35:57.373719 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Apr 12 20:35:57.373768 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:35:57.375305 kernel: scsi host0: ahci Apr 12 20:35:57.375419 kernel: scsi host1: ahci Apr 12 20:35:57.375527 kernel: scsi host2: ahci Apr 12 20:35:57.375591 kernel: scsi host3: ahci Apr 12 20:35:57.375680 kernel: scsi host4: ahci Apr 12 20:35:57.375738 kernel: scsi host5: ahci Apr 12 20:35:57.375801 kernel: scsi host6: ahci Apr 12 20:35:57.375853 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Apr 12 20:35:57.375861 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Apr 12 20:35:57.375868 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Apr 12 20:35:57.375874 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Apr 12 20:35:57.375882 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Apr 12 20:35:57.375889 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Apr 12 20:35:57.375896 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Apr 12 20:35:57.393515 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 20:35:57.393587 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:35:57.414364 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 20:35:57.414436 kernel: pps pps1: new PPS source ptp1 Apr 12 20:35:57.414494 kernel: igb 0000:04:00.0: added PHC on eth1 Apr 12 20:35:57.414552 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:35:57.414605 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f1:0b Apr 12 20:35:57.414656 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Apr 12 20:35:57.414708 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:35:57.685340 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:35:57.685417 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 20:35:57.685426 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 20:35:57.685435 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 20:35:57.686356 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 20:35:57.686374 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 20:35:57.686382 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:35:57.686389 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:35:57.686395 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 20:35:57.687306 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 20:35:57.691306 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:35:57.691322 kernel: ata2.00: Features: NCQ-prio Apr 12 20:35:57.691332 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:35:57.691340 kernel: ata1.00: Features: NCQ-prio Apr 12 20:35:57.696307 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:35:57.696379 kernel: ata2.00: configured for UDMA/133 Apr 12 20:35:57.696388 kernel: ata1.00: configured for UDMA/133 Apr 12 20:35:57.696395 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 20:35:57.696460 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 20:35:57.731308 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Apr 12 20:35:57.731388 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 20:35:58.076605 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 20:35:58.076705 kernel: hub 1-0:1.0: USB hub found Apr 12 20:35:58.097659 kernel: hub 1-0:1.0: 16 ports detected Apr 12 20:35:58.098342 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:35:58.109147 kernel: hub 2-0:1.0: USB hub found Apr 12 20:35:58.109233 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:58.130812 kernel: hub 2-0:1.0: 10 ports detected Apr 12 20:35:58.130953 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:35:58.131044 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:35:58.131146 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 20:35:58.131208 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 20:35:58.131269 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 20:35:58.131334 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:35:58.131390 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:58.131398 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Apr 12 20:35:58.133307 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 20:35:58.133324 kernel: GPT:9289727 != 937703087 Apr 12 20:35:58.133334 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 20:35:58.133342 kernel: GPT:9289727 != 937703087 Apr 12 20:35:58.133350 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 20:35:58.133356 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Apr 12 20:35:58.133363 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:58.133369 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 20:35:58.354645 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 20:35:58.354671 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 20:35:58.380119 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 20:35:58.380197 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 20:35:58.380256 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:35:58.397080 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:35:58.413359 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:35:58.438287 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:35:58.438308 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 20:35:58.490545 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 20:35:58.508254 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (539) Apr 12 20:35:58.508277 kernel: hub 1-14:1.0: USB hub found Apr 12 20:35:58.508439 kernel: hub 1-14:1.0: 4 ports detected Apr 12 20:35:58.530882 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 20:35:58.530941 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 20:35:58.572539 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 20:35:58.587283 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:35:58.631141 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:35:58.631224 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:58.609221 systemd[1]: Starting disk-uuid.service... Apr 12 20:35:58.660399 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Apr 12 20:35:58.660410 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:58.660461 disk-uuid[671]: Primary Header is updated. Apr 12 20:35:58.660461 disk-uuid[671]: Secondary Entries is updated. Apr 12 20:35:58.660461 disk-uuid[671]: Secondary Header is updated. Apr 12 20:35:58.754354 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Apr 12 20:35:58.754382 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Apr 12 20:35:58.754454 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:58.754463 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:35:58.754582 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Apr 12 20:35:58.820309 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 20:35:58.936374 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 20:35:58.968471 kernel: usbcore: registered new interface driver usbhid Apr 12 20:35:58.968491 kernel: usbhid: USB HID core driver Apr 12 20:35:59.002385 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 20:35:59.002405 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:35:59.056938 kernel: port_module: 9 callbacks suppressed Apr 12 20:35:59.056954 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Apr 12 20:35:59.057031 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 20:35:59.109702 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:35:59.109779 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 20:35:59.180041 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 20:35:59.322444 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:35:59.354306 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Apr 12 20:35:59.385499 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Apr 12 20:35:59.708541 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:35:59.730003 disk-uuid[672]: The operation has completed successfully. Apr 12 20:35:59.738419 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Apr 12 20:35:59.767090 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 20:35:59.866692 kernel: audit: type=1130 audit(1712954159.775:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:59.866710 kernel: audit: type=1131 audit(1712954159.775:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:59.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:59.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:35:59.767133 systemd[1]: Finished disk-uuid.service. Apr 12 20:35:59.897407 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 20:35:59.776007 systemd[1]: Starting verity-setup.service... Apr 12 20:35:59.928791 systemd[1]: Found device dev-mapper-usr.device. Apr 12 20:35:59.939425 systemd[1]: Mounting sysusr-usr.mount... Apr 12 20:35:59.945655 systemd[1]: Finished verity-setup.service. Apr 12 20:35:59.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.007331 kernel: audit: type=1130 audit(1712954159.957:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.064950 systemd[1]: Mounted sysusr-usr.mount. Apr 12 20:36:00.080477 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 20:36:00.073666 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 20:36:00.165083 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:36:00.165098 kernel: BTRFS info (device sdb6): using free space tree Apr 12 20:36:00.165106 kernel: BTRFS info (device sdb6): has skinny extents Apr 12 20:36:00.165113 kernel: BTRFS info (device sdb6): enabling ssd optimizations Apr 12 20:36:00.074070 systemd[1]: Starting ignition-setup.service... Apr 12 20:36:00.096764 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 20:36:00.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.174938 systemd[1]: Finished ignition-setup.service. Apr 12 20:36:00.302554 kernel: audit: type=1130 audit(1712954160.191:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.302572 kernel: audit: type=1130 audit(1712954160.250:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.191731 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 20:36:00.334017 kernel: audit: type=1334 audit(1712954160.310:24): prog-id=9 op=LOAD Apr 12 20:36:00.310000 audit: BPF prog-id=9 op=LOAD Apr 12 20:36:00.250978 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 20:36:00.311228 systemd[1]: Starting systemd-networkd.service... Apr 12 20:36:00.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.388011 ignition[866]: Ignition 2.14.0 Apr 12 20:36:00.425585 kernel: audit: type=1130 audit(1712954160.356:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.347795 systemd-networkd[877]: lo: Link UP Apr 12 20:36:00.388016 ignition[866]: Stage: fetch-offline Apr 12 20:36:00.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.347797 systemd-networkd[877]: lo: Gained carrier Apr 12 20:36:00.587713 kernel: audit: type=1130 audit(1712954160.448:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.587730 kernel: audit: type=1130 audit(1712954160.510:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.587738 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 20:36:00.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.388040 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:36:00.624568 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Apr 12 20:36:00.348096 systemd-networkd[877]: Enumeration completed Apr 12 20:36:00.388060 ignition[866]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:36:00.348165 systemd[1]: Started systemd-networkd.service. Apr 12 20:36:00.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.398990 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:36:00.348919 systemd-networkd[877]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:36:00.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.689655 iscsid[905]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:36:00.689655 iscsid[905]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 20:36:00.689655 iscsid[905]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 20:36:00.689655 iscsid[905]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 20:36:00.689655 iscsid[905]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 20:36:00.689655 iscsid[905]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:36:00.689655 iscsid[905]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 20:36:00.842464 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 20:36:00.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:00.399061 ignition[866]: parsed url from cmdline: "" Apr 12 20:36:00.356746 systemd[1]: Reached target network.target. Apr 12 20:36:00.399063 ignition[866]: no config URL provided Apr 12 20:36:00.416956 unknown[866]: fetched base config from "system" Apr 12 20:36:00.399066 ignition[866]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 20:36:00.416962 unknown[866]: fetched user config from "system" Apr 12 20:36:00.399095 ignition[866]: parsing config with SHA512: 6bf1306d133d0631ec2e268de77edb19cdafd701333366ba39e3943922ace2ae090eb8262e72afd3ab891eb223443f2c73111196b9655efbf6b6e2a252251b03 Apr 12 20:36:00.419073 systemd[1]: Starting iscsiuio.service... Apr 12 20:36:00.417334 ignition[866]: fetch-offline: fetch-offline passed Apr 12 20:36:00.433696 systemd[1]: Started iscsiuio.service. Apr 12 20:36:00.417339 ignition[866]: POST message to Packet Timeline Apr 12 20:36:00.448698 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 20:36:00.417346 ignition[866]: POST Status error: resource requires networking Apr 12 20:36:00.510706 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 20:36:00.417385 ignition[866]: Ignition finished successfully Apr 12 20:36:00.511223 systemd[1]: Starting ignition-kargs.service... Apr 12 20:36:00.592197 ignition[892]: Ignition 2.14.0 Apr 12 20:36:00.589070 systemd-networkd[877]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:36:00.592200 ignition[892]: Stage: kargs Apr 12 20:36:00.602904 systemd[1]: Starting iscsid.service... Apr 12 20:36:00.592257 ignition[892]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:36:00.632505 systemd[1]: Started iscsid.service. Apr 12 20:36:00.592266 ignition[892]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:36:00.646887 systemd[1]: Starting dracut-initqueue.service... Apr 12 20:36:00.594775 ignition[892]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:36:00.661571 systemd[1]: Finished dracut-initqueue.service. Apr 12 20:36:00.595473 ignition[892]: kargs: kargs passed Apr 12 20:36:00.671503 systemd[1]: Reached target remote-fs-pre.target. Apr 12 20:36:00.595476 ignition[892]: POST message to Packet Timeline Apr 12 20:36:00.697523 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:36:00.595486 ignition[892]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:36:00.718527 systemd[1]: Reached target remote-fs.target. Apr 12 20:36:00.598608 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41160->[::1]:53: read: connection refused Apr 12 20:36:00.757775 systemd[1]: Starting dracut-pre-mount.service... Apr 12 20:36:00.799220 ignition[892]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 20:36:00.790571 systemd[1]: Finished dracut-pre-mount.service. Apr 12 20:36:00.799600 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33885->[::1]:53: read: connection refused Apr 12 20:36:00.832087 systemd-networkd[877]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:36:00.860529 systemd-networkd[877]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:36:00.888976 systemd-networkd[877]: enp1s0f1np1: Link UP Apr 12 20:36:00.889276 systemd-networkd[877]: enp1s0f1np1: Gained carrier Apr 12 20:36:00.901787 systemd-networkd[877]: enp1s0f0np0: Link UP Apr 12 20:36:00.902148 systemd-networkd[877]: eno2: Link UP Apr 12 20:36:00.902510 systemd-networkd[877]: eno1: Link UP Apr 12 20:36:01.200030 ignition[892]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 20:36:01.201021 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60200->[::1]:53: read: connection refused Apr 12 20:36:01.671463 systemd-networkd[877]: enp1s0f0np0: Gained carrier Apr 12 20:36:01.681554 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Apr 12 20:36:01.715499 systemd-networkd[877]: enp1s0f0np0: DHCPv4 address 139.178.91.217/31, gateway 139.178.91.216 acquired from 145.40.83.140 Apr 12 20:36:01.839707 systemd-networkd[877]: enp1s0f1np1: Gained IPv6LL Apr 12 20:36:02.001569 ignition[892]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 20:36:02.002954 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57902->[::1]:53: read: connection refused Apr 12 20:36:02.927885 systemd-networkd[877]: enp1s0f0np0: Gained IPv6LL Apr 12 20:36:03.604673 ignition[892]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 20:36:03.605942 ignition[892]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37740->[::1]:53: read: connection refused Apr 12 20:36:06.809354 ignition[892]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 20:36:06.845814 ignition[892]: GET result: OK Apr 12 20:36:07.049078 ignition[892]: Ignition finished successfully Apr 12 20:36:07.050490 systemd[1]: Finished ignition-kargs.service. Apr 12 20:36:07.143101 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 20:36:07.143120 kernel: audit: type=1130 audit(1712954167.065:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.072815 ignition[922]: Ignition 2.14.0 Apr 12 20:36:07.066379 systemd[1]: Starting ignition-disks.service... Apr 12 20:36:07.072818 ignition[922]: Stage: disks Apr 12 20:36:07.072891 ignition[922]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:36:07.072902 ignition[922]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:36:07.074304 ignition[922]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:36:07.076194 ignition[922]: disks: disks passed Apr 12 20:36:07.076197 ignition[922]: POST message to Packet Timeline Apr 12 20:36:07.076207 ignition[922]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:36:07.100657 ignition[922]: GET result: OK Apr 12 20:36:07.291546 ignition[922]: Ignition finished successfully Apr 12 20:36:07.294814 systemd[1]: Finished ignition-disks.service. Apr 12 20:36:07.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.307832 systemd[1]: Reached target initrd-root-device.target. Apr 12 20:36:07.388582 kernel: audit: type=1130 audit(1712954167.307:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.374520 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:36:07.374556 systemd[1]: Reached target local-fs.target. Apr 12 20:36:07.397554 systemd[1]: Reached target sysinit.target. Apr 12 20:36:07.412530 systemd[1]: Reached target basic.target. Apr 12 20:36:07.426224 systemd[1]: Starting systemd-fsck-root.service... Apr 12 20:36:07.445936 systemd-fsck[940]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 20:36:07.458765 systemd[1]: Finished systemd-fsck-root.service. Apr 12 20:36:07.552549 kernel: audit: type=1130 audit(1712954167.467:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.552563 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 20:36:07.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.472814 systemd[1]: Mounting sysroot.mount... Apr 12 20:36:07.559950 systemd[1]: Mounted sysroot.mount. Apr 12 20:36:07.573582 systemd[1]: Reached target initrd-root-fs.target. Apr 12 20:36:07.582109 systemd[1]: Mounting sysroot-usr.mount... Apr 12 20:36:07.603306 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 20:36:07.617879 systemd[1]: Starting flatcar-static-network.service... Apr 12 20:36:07.635383 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 20:36:07.635420 systemd[1]: Reached target ignition-diskful.target. Apr 12 20:36:07.654600 systemd[1]: Mounted sysroot-usr.mount. Apr 12 20:36:07.679290 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:36:07.750425 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (954) Apr 12 20:36:07.750444 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:36:07.691793 systemd[1]: Starting initrd-setup-root.service... Apr 12 20:36:07.822867 kernel: BTRFS info (device sdb6): using free space tree Apr 12 20:36:07.822958 kernel: BTRFS info (device sdb6): has skinny extents Apr 12 20:36:07.822970 kernel: BTRFS info (device sdb6): enabling ssd optimizations Apr 12 20:36:07.755089 systemd[1]: Finished initrd-setup-root.service. Apr 12 20:36:07.886296 kernel: audit: type=1130 audit(1712954167.831:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.886372 initrd-setup-root[960]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 20:36:07.832580 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:36:07.904637 coreos-metadata[947]: Apr 12 20:36:07.778 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:36:07.904637 coreos-metadata[947]: Apr 12 20:36:07.855 INFO Fetch successful Apr 12 20:36:07.904637 coreos-metadata[947]: Apr 12 20:36:07.874 INFO wrote hostname ci-3510.3.3-a-413b88e4ca to /sysroot/etc/hostname Apr 12 20:36:08.116544 kernel: audit: type=1130 audit(1712954167.918:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:08.116643 kernel: audit: type=1130 audit(1712954167.982:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:08.116704 kernel: audit: type=1131 audit(1712954167.982:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:08.117071 coreos-metadata[948]: Apr 12 20:36:07.778 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:36:08.117071 coreos-metadata[948]: Apr 12 20:36:07.855 INFO Fetch successful Apr 12 20:36:08.144426 initrd-setup-root[968]: cut: /sysroot/etc/group: No such file or directory Apr 12 20:36:08.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:07.894628 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 20:36:08.217533 kernel: audit: type=1130 audit(1712954168.152:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:08.217589 initrd-setup-root[976]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 20:36:07.918573 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 20:36:08.237556 initrd-setup-root[984]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 20:36:07.918615 systemd[1]: Finished flatcar-static-network.service. Apr 12 20:36:07.982919 systemd[1]: Starting ignition-mount.service... Apr 12 20:36:08.262455 ignition[1023]: INFO : Ignition 2.14.0 Apr 12 20:36:08.262455 ignition[1023]: INFO : Stage: mount Apr 12 20:36:08.262455 ignition[1023]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:36:08.262455 ignition[1023]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:36:08.262455 ignition[1023]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:36:08.262455 ignition[1023]: INFO : mount: mount passed Apr 12 20:36:08.262455 ignition[1023]: INFO : POST message to Packet Timeline Apr 12 20:36:08.262455 ignition[1023]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:36:08.262455 ignition[1023]: INFO : GET result: OK Apr 12 20:36:08.103889 systemd[1]: Starting sysroot-boot.service... Apr 12 20:36:08.358610 ignition[1023]: INFO : Ignition finished successfully Apr 12 20:36:08.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:08.126707 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 20:36:08.458650 kernel: audit: type=1130 audit(1712954168.367:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:08.458700 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1039) Apr 12 20:36:08.126935 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 20:36:08.542426 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:36:08.542437 kernel: BTRFS info (device sdb6): using free space tree Apr 12 20:36:08.542445 kernel: BTRFS info (device sdb6): has skinny extents Apr 12 20:36:08.542454 kernel: BTRFS info (device sdb6): enabling ssd optimizations Apr 12 20:36:08.139108 systemd[1]: Finished sysroot-boot.service. Apr 12 20:36:08.354163 systemd[1]: Finished ignition-mount.service. Apr 12 20:36:08.369490 systemd[1]: Starting ignition-files.service... Apr 12 20:36:08.605590 ignition[1058]: INFO : Ignition 2.14.0 Apr 12 20:36:08.605590 ignition[1058]: INFO : Stage: files Apr 12 20:36:08.605590 ignition[1058]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:36:08.605590 ignition[1058]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:36:08.605590 ignition[1058]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:36:08.605590 ignition[1058]: DEBUG : files: compiled without relabeling support, skipping Apr 12 20:36:08.605590 ignition[1058]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 20:36:08.605590 ignition[1058]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 20:36:08.605590 ignition[1058]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 20:36:08.605590 ignition[1058]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 20:36:08.605590 ignition[1058]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 20:36:08.605590 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 20:36:08.605590 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 20:36:08.443221 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:36:08.777346 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 20:36:08.576888 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:36:08.797501 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 20:36:08.797501 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 20:36:08.797501 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 20:36:08.602810 unknown[1058]: wrote ssh authorized keys file for user: core Apr 12 20:36:09.348817 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 20:36:09.448149 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 20:36:09.448149 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 20:36:09.491532 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 20:36:09.491532 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 20:36:09.863238 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 20:36:09.926715 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 20:36:09.926715 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 20:36:09.968614 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 20:36:09.968614 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 20:36:10.002999 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 20:36:10.198655 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 20:36:10.198655 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 20:36:10.240531 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 20:36:10.240531 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 20:36:10.273403 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 20:36:10.723548 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 20:36:10.723548 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 20:36:10.766516 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 20:36:10.766516 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Apr 12 20:36:10.919526 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 20:36:16.870330 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 20:36:16.904431 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem688289563" Apr 12 20:36:17.173611 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1062) Apr 12 20:36:16.915673 systemd[1]: mnt-oem688289563.mount: Deactivated successfully. Apr 12 20:36:17.183598 ignition[1058]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem688289563": device or resource busy Apr 12 20:36:17.183598 ignition[1058]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem688289563", trying btrfs: device or resource busy Apr 12 20:36:17.183598 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem688289563" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem688289563" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem688289563" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem688289563" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Apr 12 20:36:17.183598 ignition[1058]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 20:36:17.892498 kernel: audit: type=1130 audit(1712954177.192:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.892613 kernel: audit: type=1130 audit(1712954177.311:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.892640 kernel: audit: type=1130 audit(1712954177.380:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.892674 kernel: audit: type=1131 audit(1712954177.380:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.892696 kernel: audit: type=1130 audit(1712954177.574:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.892718 kernel: audit: type=1131 audit(1712954177.574:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.892740 kernel: audit: type=1130 audit(1712954177.747:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.174722 systemd[1]: Finished ignition-files.service. Apr 12 20:36:17.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-helm.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1f): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: op(1f): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:36:17.967554 ignition[1058]: INFO : files: files passed Apr 12 20:36:17.967554 ignition[1058]: INFO : POST message to Packet Timeline Apr 12 20:36:17.967554 ignition[1058]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:36:17.967554 ignition[1058]: INFO : GET result: OK Apr 12 20:36:17.967554 ignition[1058]: INFO : Ignition finished successfully Apr 12 20:36:18.532403 kernel: audit: type=1131 audit(1712954177.900:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.532422 kernel: audit: type=1131 audit(1712954178.209:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.532546 kernel: audit: type=1131 audit(1712954178.301:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.200673 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 20:36:17.267546 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 20:36:18.573506 initrd-setup-root-after-ignition[1093]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 20:36:17.267890 systemd[1]: Starting ignition-quench.service... Apr 12 20:36:18.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.288780 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 20:36:18.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.311903 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 20:36:17.312020 systemd[1]: Finished ignition-quench.service. Apr 12 20:36:18.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.380666 systemd[1]: Reached target ignition-complete.target. Apr 12 20:36:18.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.516999 systemd[1]: Starting initrd-parse-etc.service... Apr 12 20:36:17.561631 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 20:36:18.695673 ignition[1108]: INFO : Ignition 2.14.0 Apr 12 20:36:18.695673 ignition[1108]: INFO : Stage: umount Apr 12 20:36:18.695673 ignition[1108]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:36:18.695673 ignition[1108]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:36:18.695673 ignition[1108]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:36:18.695673 ignition[1108]: INFO : umount: umount passed Apr 12 20:36:18.695673 ignition[1108]: INFO : POST message to Packet Timeline Apr 12 20:36:18.695673 ignition[1108]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:36:18.695673 ignition[1108]: INFO : GET result: OK Apr 12 20:36:18.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.561708 systemd[1]: Finished initrd-parse-etc.service. Apr 12 20:36:18.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.870091 ignition[1108]: INFO : Ignition finished successfully Apr 12 20:36:18.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.574696 systemd[1]: Reached target initrd-fs.target. Apr 12 20:36:18.885000 audit: BPF prog-id=6 op=UNLOAD Apr 12 20:36:17.699515 systemd[1]: Reached target initrd.target. Apr 12 20:36:18.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.699628 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 20:36:18.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.699989 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 20:36:18.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.734584 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 20:36:17.748096 systemd[1]: Starting initrd-cleanup.service... Apr 12 20:36:18.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.815255 systemd[1]: Stopped target nss-lookup.target. Apr 12 20:36:17.831666 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 20:36:17.850658 systemd[1]: Stopped target timers.target. Apr 12 20:36:19.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.875564 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 20:36:19.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.875704 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 20:36:19.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.901219 systemd[1]: Stopped target initrd.target. Apr 12 20:36:17.974527 systemd[1]: Stopped target basic.target. Apr 12 20:36:19.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:17.991656 systemd[1]: Stopped target ignition-complete.target. Apr 12 20:36:19.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.008642 systemd[1]: Stopped target ignition-diskful.target. Apr 12 20:36:19.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.027644 systemd[1]: Stopped target initrd-root-device.target. Apr 12 20:36:19.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:19.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.059684 systemd[1]: Stopped target remote-fs.target. Apr 12 20:36:18.084901 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 20:36:18.103879 systemd[1]: Stopped target sysinit.target. Apr 12 20:36:18.125857 systemd[1]: Stopped target local-fs.target. Apr 12 20:36:18.148879 systemd[1]: Stopped target local-fs-pre.target. Apr 12 20:36:18.169955 systemd[1]: Stopped target swap.target. Apr 12 20:36:18.189737 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 20:36:18.190099 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 20:36:18.210113 systemd[1]: Stopped target cryptsetup.target. Apr 12 20:36:18.286596 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 20:36:18.286678 systemd[1]: Stopped dracut-initqueue.service. Apr 12 20:36:18.301750 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 20:36:18.301823 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 20:36:18.371639 systemd[1]: Stopped target paths.target. Apr 12 20:36:19.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:18.385678 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 20:36:18.390533 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 20:36:18.405669 systemd[1]: Stopped target slices.target. Apr 12 20:36:18.436721 systemd[1]: Stopped target sockets.target. Apr 12 20:36:18.452800 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 20:36:18.452933 systemd[1]: Closed iscsid.socket. Apr 12 20:36:18.473088 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 20:36:18.473485 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 20:36:18.492020 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 20:36:19.356872 iscsid[905]: iscsid shutting down. Apr 12 20:36:18.492394 systemd[1]: Stopped ignition-files.service. Apr 12 20:36:18.510015 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 20:36:18.510408 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 20:36:18.527014 systemd[1]: Stopping ignition-mount.service... Apr 12 20:36:18.539512 systemd[1]: Stopping iscsiuio.service... Apr 12 20:36:18.557025 systemd[1]: Stopping sysroot-boot.service... Apr 12 20:36:18.581510 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 20:36:18.581780 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 20:36:18.604160 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 20:36:18.604541 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 20:36:18.626958 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 20:36:19.357317 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Apr 12 20:36:18.629004 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 20:36:18.629245 systemd[1]: Stopped iscsiuio.service. Apr 12 20:36:18.643772 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 20:36:18.643999 systemd[1]: Stopped sysroot-boot.service. Apr 12 20:36:18.657876 systemd[1]: Stopped target network.target. Apr 12 20:36:18.672768 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 20:36:18.672868 systemd[1]: Closed iscsiuio.socket. Apr 12 20:36:18.687893 systemd[1]: Stopping systemd-networkd.service... Apr 12 20:36:18.698442 systemd-networkd[877]: enp1s0f0np0: DHCPv6 lease lost Apr 12 20:36:18.702739 systemd[1]: Stopping systemd-resolved.service... Apr 12 20:36:18.705526 systemd-networkd[877]: enp1s0f1np1: DHCPv6 lease lost Apr 12 20:36:18.718364 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 20:36:19.357000 audit: BPF prog-id=9 op=UNLOAD Apr 12 20:36:18.718626 systemd[1]: Stopped systemd-resolved.service. Apr 12 20:36:18.734446 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 20:36:18.734710 systemd[1]: Stopped systemd-networkd.service. Apr 12 20:36:18.753083 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 20:36:18.753325 systemd[1]: Finished initrd-cleanup.service. Apr 12 20:36:18.779205 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 20:36:18.779438 systemd[1]: Stopped ignition-mount.service. Apr 12 20:36:18.800671 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 20:36:18.800759 systemd[1]: Closed systemd-networkd.socket. Apr 12 20:36:18.814543 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 20:36:18.814669 systemd[1]: Stopped ignition-disks.service. Apr 12 20:36:18.822752 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 20:36:18.822890 systemd[1]: Stopped ignition-kargs.service. Apr 12 20:36:18.847829 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 20:36:18.847985 systemd[1]: Stopped ignition-setup.service. Apr 12 20:36:18.862652 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 20:36:18.862800 systemd[1]: Stopped initrd-setup-root.service. Apr 12 20:36:18.879504 systemd[1]: Stopping network-cleanup.service... Apr 12 20:36:18.892554 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 20:36:18.892727 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 20:36:18.907703 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 20:36:18.907841 systemd[1]: Stopped systemd-sysctl.service. Apr 12 20:36:18.923058 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 20:36:18.923206 systemd[1]: Stopped systemd-modules-load.service. Apr 12 20:36:18.942947 systemd[1]: Stopping systemd-udevd.service... Apr 12 20:36:18.961430 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 20:36:18.961995 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 20:36:18.962060 systemd[1]: Stopped systemd-udevd.service. Apr 12 20:36:18.974609 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 20:36:18.974634 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 20:36:18.988495 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 20:36:18.988520 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 20:36:19.003484 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 20:36:19.003527 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 20:36:19.019612 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 20:36:19.019695 systemd[1]: Stopped dracut-cmdline.service. Apr 12 20:36:19.034634 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 20:36:19.034783 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 20:36:19.052608 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 20:36:19.066474 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 20:36:19.066508 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 20:36:19.080455 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 20:36:19.080485 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 20:36:19.095435 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 20:36:19.095475 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 20:36:19.114137 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 20:36:19.115532 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 20:36:19.115760 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 20:36:19.233748 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 20:36:19.233984 systemd[1]: Stopped network-cleanup.service. Apr 12 20:36:19.242835 systemd[1]: Reached target initrd-switch-root.target. Apr 12 20:36:19.260236 systemd[1]: Starting initrd-switch-root.service... Apr 12 20:36:19.301426 systemd[1]: Switching root. Apr 12 20:36:19.359478 systemd-journald[267]: Journal stopped Apr 12 20:36:23.385935 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 20:36:23.385948 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 20:36:23.385957 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 20:36:23.385963 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 20:36:23.385968 kernel: SELinux: policy capability open_perms=1 Apr 12 20:36:23.385973 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 20:36:23.385979 kernel: SELinux: policy capability always_check_network=0 Apr 12 20:36:23.385984 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 20:36:23.385989 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 20:36:23.385996 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 20:36:23.386001 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 20:36:23.386007 systemd[1]: Successfully loaded SELinux policy in 324.290ms. Apr 12 20:36:23.386015 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.561ms. Apr 12 20:36:23.386022 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:36:23.386030 systemd[1]: Detected architecture x86-64. Apr 12 20:36:23.386036 systemd[1]: Detected first boot. Apr 12 20:36:23.386041 systemd[1]: Hostname set to . Apr 12 20:36:23.386048 systemd[1]: Initializing machine ID from random generator. Apr 12 20:36:23.386053 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 20:36:23.386059 systemd[1]: Populated /etc with preset unit settings. Apr 12 20:36:23.386065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:36:23.386073 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:36:23.386080 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:36:23.386086 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 20:36:23.386092 systemd[1]: Stopped iscsid.service. Apr 12 20:36:23.386097 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 20:36:23.386104 systemd[1]: Stopped initrd-switch-root.service. Apr 12 20:36:23.386111 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 20:36:23.386117 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 20:36:23.386123 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 20:36:23.386129 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 20:36:23.386135 systemd[1]: Created slice system-getty.slice. Apr 12 20:36:23.386141 systemd[1]: Created slice system-modprobe.slice. Apr 12 20:36:23.386147 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 20:36:23.386153 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 20:36:23.386159 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 20:36:23.386166 systemd[1]: Created slice user.slice. Apr 12 20:36:23.386172 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:36:23.386178 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 20:36:23.386184 systemd[1]: Set up automount boot.automount. Apr 12 20:36:23.386192 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 20:36:23.386198 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 20:36:23.386204 systemd[1]: Stopped target initrd-fs.target. Apr 12 20:36:23.386211 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 20:36:23.386218 systemd[1]: Reached target integritysetup.target. Apr 12 20:36:23.386224 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:36:23.386230 systemd[1]: Reached target remote-fs.target. Apr 12 20:36:23.386237 systemd[1]: Reached target slices.target. Apr 12 20:36:23.386243 systemd[1]: Reached target swap.target. Apr 12 20:36:23.386249 systemd[1]: Reached target torcx.target. Apr 12 20:36:23.386255 systemd[1]: Reached target veritysetup.target. Apr 12 20:36:23.386262 systemd[1]: Listening on systemd-coredump.socket. Apr 12 20:36:23.386269 systemd[1]: Listening on systemd-initctl.socket. Apr 12 20:36:23.386276 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:36:23.386282 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:36:23.386288 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:36:23.386295 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 20:36:23.386303 systemd[1]: Mounting dev-hugepages.mount... Apr 12 20:36:23.386311 systemd[1]: Mounting dev-mqueue.mount... Apr 12 20:36:23.386318 systemd[1]: Mounting media.mount... Apr 12 20:36:23.386324 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:36:23.386330 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 20:36:23.386337 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 20:36:23.386343 systemd[1]: Mounting tmp.mount... Apr 12 20:36:23.386349 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 20:36:23.386356 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 20:36:23.386362 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:36:23.386369 systemd[1]: Starting modprobe@configfs.service... Apr 12 20:36:23.386376 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 20:36:23.386382 systemd[1]: Starting modprobe@drm.service... Apr 12 20:36:23.386388 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 20:36:23.386395 systemd[1]: Starting modprobe@fuse.service... Apr 12 20:36:23.386402 kernel: fuse: init (API version 7.34) Apr 12 20:36:23.386407 systemd[1]: Starting modprobe@loop.service... Apr 12 20:36:23.386414 kernel: loop: module loaded Apr 12 20:36:23.386421 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 20:36:23.386428 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 20:36:23.386434 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 20:36:23.386440 kernel: kauditd_printk_skb: 66 callbacks suppressed Apr 12 20:36:23.386446 kernel: audit: type=1131 audit(1712954183.027:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.386469 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 20:36:23.386476 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 20:36:23.386501 kernel: audit: type=1131 audit(1712954183.115:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.386509 systemd[1]: Stopped systemd-journald.service. Apr 12 20:36:23.386515 kernel: audit: type=1130 audit(1712954183.179:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.386522 kernel: audit: type=1131 audit(1712954183.179:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.386528 kernel: audit: type=1334 audit(1712954183.265:113): prog-id=18 op=LOAD Apr 12 20:36:23.386534 kernel: audit: type=1334 audit(1712954183.283:114): prog-id=19 op=LOAD Apr 12 20:36:23.386556 kernel: audit: type=1334 audit(1712954183.301:115): prog-id=20 op=LOAD Apr 12 20:36:23.386580 kernel: audit: type=1334 audit(1712954183.319:116): prog-id=16 op=UNLOAD Apr 12 20:36:23.386586 systemd[1]: Starting systemd-journald.service... Apr 12 20:36:23.386594 kernel: audit: type=1334 audit(1712954183.319:117): prog-id=17 op=UNLOAD Apr 12 20:36:23.386600 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:36:23.386607 kernel: audit: type=1305 audit(1712954183.382:118): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:36:23.386638 systemd-journald[1256]: Journal started Apr 12 20:36:23.386677 systemd-journald[1256]: Runtime Journal (/run/log/journal/9abb9e1afda7469482f5c1d48b9aac60) is 8.0M, max 640.1M, 632.1M free. Apr 12 20:36:19.810000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 20:36:20.078000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:36:20.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:36:20.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:36:20.081000 audit: BPF prog-id=10 op=LOAD Apr 12 20:36:20.081000 audit: BPF prog-id=10 op=UNLOAD Apr 12 20:36:20.081000 audit: BPF prog-id=11 op=LOAD Apr 12 20:36:20.081000 audit: BPF prog-id=11 op=UNLOAD Apr 12 20:36:20.151000 audit[1146]: AVC avc: denied { associate } for pid=1146 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 20:36:20.151000 audit[1146]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1129 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:20.151000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:36:20.177000 audit[1146]: AVC avc: denied { associate } for pid=1146 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 20:36:20.177000 audit[1146]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1129 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:20.177000 audit: CWD cwd="/" Apr 12 20:36:20.177000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:20.177000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:20.177000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:36:21.711000 audit: BPF prog-id=12 op=LOAD Apr 12 20:36:21.711000 audit: BPF prog-id=3 op=UNLOAD Apr 12 20:36:21.711000 audit: BPF prog-id=13 op=LOAD Apr 12 20:36:21.711000 audit: BPF prog-id=14 op=LOAD Apr 12 20:36:21.711000 audit: BPF prog-id=4 op=UNLOAD Apr 12 20:36:21.711000 audit: BPF prog-id=5 op=UNLOAD Apr 12 20:36:21.712000 audit: BPF prog-id=15 op=LOAD Apr 12 20:36:21.712000 audit: BPF prog-id=12 op=UNLOAD Apr 12 20:36:21.712000 audit: BPF prog-id=16 op=LOAD Apr 12 20:36:21.712000 audit: BPF prog-id=17 op=LOAD Apr 12 20:36:21.712000 audit: BPF prog-id=13 op=UNLOAD Apr 12 20:36:21.712000 audit: BPF prog-id=14 op=UNLOAD Apr 12 20:36:21.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:21.759000 audit: BPF prog-id=15 op=UNLOAD Apr 12 20:36:21.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:21.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:21.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.265000 audit: BPF prog-id=18 op=LOAD Apr 12 20:36:23.283000 audit: BPF prog-id=19 op=LOAD Apr 12 20:36:23.301000 audit: BPF prog-id=20 op=LOAD Apr 12 20:36:23.319000 audit: BPF prog-id=16 op=UNLOAD Apr 12 20:36:23.319000 audit: BPF prog-id=17 op=UNLOAD Apr 12 20:36:23.382000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:36:21.709771 systemd[1]: Queued start job for default target multi-user.target. Apr 12 20:36:20.148810 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:36:21.713524 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 20:36:20.149420 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:36:20.149437 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:36:20.149463 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 20:36:20.149472 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 20:36:20.149498 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 20:36:20.149509 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 20:36:20.149669 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 20:36:20.149702 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:36:20.149713 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:36:20.151244 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 20:36:20.151275 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 20:36:20.151292 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 20:36:20.151308 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 20:36:20.151324 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 20:36:20.151335 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 20:36:21.355110 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:36:21.355256 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:36:21.355319 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:36:21.355449 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:36:21.355482 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 20:36:21.355517 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2024-04-12T20:36:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 20:36:23.382000 audit[1256]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd3f246350 a2=4000 a3=7ffd3f2463ec items=0 ppid=1 pid=1256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:23.382000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 20:36:23.464392 systemd[1]: Starting systemd-network-generator.service... Apr 12 20:36:23.491312 systemd[1]: Starting systemd-remount-fs.service... Apr 12 20:36:23.518360 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:36:23.560986 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 20:36:23.561039 systemd[1]: Stopped verity-setup.service. Apr 12 20:36:23.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.606342 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:36:23.626500 systemd[1]: Started systemd-journald.service. Apr 12 20:36:23.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.634846 systemd[1]: Mounted dev-hugepages.mount. Apr 12 20:36:23.642587 systemd[1]: Mounted dev-mqueue.mount. Apr 12 20:36:23.649569 systemd[1]: Mounted media.mount. Apr 12 20:36:23.656567 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 20:36:23.665552 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 20:36:23.674539 systemd[1]: Mounted tmp.mount. Apr 12 20:36:23.681628 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 20:36:23.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.690640 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:36:23.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.698703 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 20:36:23.698822 systemd[1]: Finished modprobe@configfs.service. Apr 12 20:36:23.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.707739 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 20:36:23.707878 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 20:36:23.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.716892 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 20:36:23.717089 systemd[1]: Finished modprobe@drm.service. Apr 12 20:36:23.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.726132 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 20:36:23.726466 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 20:36:23.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.735110 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 20:36:23.735434 systemd[1]: Finished modprobe@fuse.service. Apr 12 20:36:23.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.745176 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 20:36:23.745499 systemd[1]: Finished modprobe@loop.service. Apr 12 20:36:23.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.755191 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:36:23.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.764107 systemd[1]: Finished systemd-network-generator.service. Apr 12 20:36:23.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.774092 systemd[1]: Finished systemd-remount-fs.service. Apr 12 20:36:23.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.783081 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:36:23.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.792588 systemd[1]: Reached target network-pre.target. Apr 12 20:36:23.804210 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 20:36:23.814019 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 20:36:23.821508 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 20:36:23.822559 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 20:36:23.829955 systemd[1]: Starting systemd-journal-flush.service... Apr 12 20:36:23.833736 systemd-journald[1256]: Time spent on flushing to /var/log/journal/9abb9e1afda7469482f5c1d48b9aac60 is 15.627ms for 1623 entries. Apr 12 20:36:23.833736 systemd-journald[1256]: System Journal (/var/log/journal/9abb9e1afda7469482f5c1d48b9aac60) is 8.0M, max 195.6M, 187.6M free. Apr 12 20:36:23.874180 systemd-journald[1256]: Received client request to flush runtime journal. Apr 12 20:36:23.845444 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 20:36:23.845917 systemd[1]: Starting systemd-random-seed.service... Apr 12 20:36:23.862428 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 20:36:23.862935 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:36:23.869948 systemd[1]: Starting systemd-sysusers.service... Apr 12 20:36:23.876977 systemd[1]: Starting systemd-udev-settle.service... Apr 12 20:36:23.884523 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 20:36:23.892485 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 20:36:23.900533 systemd[1]: Finished systemd-journal-flush.service. Apr 12 20:36:23.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.908546 systemd[1]: Finished systemd-random-seed.service. Apr 12 20:36:23.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.917537 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:36:23.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.926527 systemd[1]: Finished systemd-sysusers.service. Apr 12 20:36:23.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:23.936598 systemd[1]: Reached target first-boot-complete.target. Apr 12 20:36:23.946050 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:36:23.955410 udevadm[1272]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 20:36:23.965895 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:36:23.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:24.131160 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 20:36:24.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:24.139000 audit: BPF prog-id=21 op=LOAD Apr 12 20:36:24.139000 audit: BPF prog-id=22 op=LOAD Apr 12 20:36:24.139000 audit: BPF prog-id=7 op=UNLOAD Apr 12 20:36:24.139000 audit: BPF prog-id=8 op=UNLOAD Apr 12 20:36:24.140536 systemd[1]: Starting systemd-udevd.service... Apr 12 20:36:24.151971 systemd-udevd[1275]: Using default interface naming scheme 'v252'. Apr 12 20:36:24.170952 systemd[1]: Started systemd-udevd.service. Apr 12 20:36:24.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:24.181621 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 20:36:24.182000 audit: BPF prog-id=23 op=LOAD Apr 12 20:36:24.182815 systemd[1]: Starting systemd-networkd.service... Apr 12 20:36:24.206338 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 20:36:24.206393 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 20:36:24.227312 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1277) Apr 12 20:36:24.227000 audit: BPF prog-id=24 op=LOAD Apr 12 20:36:24.252354 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 20:36:24.269000 audit: BPF prog-id=25 op=LOAD Apr 12 20:36:24.270335 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 20:36:24.290000 audit: BPF prog-id=26 op=LOAD Apr 12 20:36:24.291394 systemd[1]: Starting systemd-userdbd.service... Apr 12 20:36:24.310250 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:36:24.311307 kernel: IPMI message handler: version 39.2 Apr 12 20:36:24.311332 kernel: ACPI: button: Power Button [PWRF] Apr 12 20:36:24.264000 audit[1319]: AVC avc: denied { confidentiality } for pid=1319 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:36:24.349307 kernel: ipmi device interface Apr 12 20:36:24.394145 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 20:36:24.395785 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 20:36:24.396265 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 20:36:24.396529 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 20:36:24.264000 audit[1319]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5579fb1010 a1=11ed8c a2=7f557bdd7bc5 a3=5 items=312 ppid=1275 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:24.264000 audit: CWD cwd="/" Apr 12 20:36:24.264000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=1 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=2 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=3 name=(null) inode=26717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=4 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=5 name=(null) inode=26718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=6 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=7 name=(null) inode=26719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=8 name=(null) inode=26719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=9 name=(null) inode=26720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=10 name=(null) inode=26719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=11 name=(null) inode=26721 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=12 name=(null) inode=26719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=13 name=(null) inode=26722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=14 name=(null) inode=26719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=15 name=(null) inode=26723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=16 name=(null) inode=26719 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=17 name=(null) inode=26724 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.397364 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 20:36:24.264000 audit: PATH item=18 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=19 name=(null) inode=26725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=20 name=(null) inode=26725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=21 name=(null) inode=26726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=22 name=(null) inode=26725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=23 name=(null) inode=26727 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=24 name=(null) inode=26725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=25 name=(null) inode=26728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=26 name=(null) inode=26725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=27 name=(null) inode=26729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=28 name=(null) inode=26725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=29 name=(null) inode=26730 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=30 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=31 name=(null) inode=26731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=32 name=(null) inode=26731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=33 name=(null) inode=26732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=34 name=(null) inode=26731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=35 name=(null) inode=26733 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=36 name=(null) inode=26731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=37 name=(null) inode=26734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=38 name=(null) inode=26731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=39 name=(null) inode=26735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=40 name=(null) inode=26731 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=41 name=(null) inode=26736 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=42 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=43 name=(null) inode=26737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=44 name=(null) inode=26737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=45 name=(null) inode=26738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=46 name=(null) inode=26737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=47 name=(null) inode=26739 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=48 name=(null) inode=26737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=49 name=(null) inode=26740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=50 name=(null) inode=26737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=51 name=(null) inode=26741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=52 name=(null) inode=26737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=53 name=(null) inode=26742 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=54 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=55 name=(null) inode=26743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=56 name=(null) inode=26743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=57 name=(null) inode=26744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=58 name=(null) inode=26743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=59 name=(null) inode=26745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=60 name=(null) inode=26743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=61 name=(null) inode=26746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=62 name=(null) inode=26743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=63 name=(null) inode=26747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=64 name=(null) inode=26743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=65 name=(null) inode=26748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=66 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=67 name=(null) inode=26749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=68 name=(null) inode=26749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=69 name=(null) inode=26750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=70 name=(null) inode=26749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=71 name=(null) inode=26751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=72 name=(null) inode=26749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=73 name=(null) inode=26752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=74 name=(null) inode=26749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=75 name=(null) inode=26753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=76 name=(null) inode=26749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=77 name=(null) inode=26754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=78 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=79 name=(null) inode=26755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=80 name=(null) inode=26755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=81 name=(null) inode=26756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=82 name=(null) inode=26755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=83 name=(null) inode=26757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=84 name=(null) inode=26755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=85 name=(null) inode=26758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=86 name=(null) inode=26755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=87 name=(null) inode=26759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=88 name=(null) inode=26755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=89 name=(null) inode=26760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=90 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=91 name=(null) inode=26761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=92 name=(null) inode=26761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=93 name=(null) inode=26762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=94 name=(null) inode=26761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=95 name=(null) inode=26763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=96 name=(null) inode=26761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=97 name=(null) inode=26764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=98 name=(null) inode=26761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=99 name=(null) inode=26765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=100 name=(null) inode=26761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=101 name=(null) inode=26766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=102 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=103 name=(null) inode=26767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=104 name=(null) inode=26767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=105 name=(null) inode=26768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=106 name=(null) inode=26767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=107 name=(null) inode=26769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=108 name=(null) inode=26767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=109 name=(null) inode=26770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=110 name=(null) inode=26767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=111 name=(null) inode=26771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=112 name=(null) inode=26767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=113 name=(null) inode=26772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=114 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=115 name=(null) inode=26773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=116 name=(null) inode=26773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=117 name=(null) inode=26774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=118 name=(null) inode=26773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=119 name=(null) inode=26775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=120 name=(null) inode=26773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=121 name=(null) inode=26776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=122 name=(null) inode=26773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=123 name=(null) inode=26777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=124 name=(null) inode=26773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=125 name=(null) inode=26778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=126 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=127 name=(null) inode=26779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=128 name=(null) inode=26779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=129 name=(null) inode=26780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=130 name=(null) inode=26779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=131 name=(null) inode=26781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=132 name=(null) inode=26779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=133 name=(null) inode=26782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=134 name=(null) inode=26779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=135 name=(null) inode=26783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=136 name=(null) inode=26779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=137 name=(null) inode=26784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=138 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=139 name=(null) inode=26785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=140 name=(null) inode=26785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=141 name=(null) inode=26786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=142 name=(null) inode=26785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=143 name=(null) inode=26787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=144 name=(null) inode=26785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=145 name=(null) inode=26788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=146 name=(null) inode=26785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=147 name=(null) inode=26789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=148 name=(null) inode=26785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=149 name=(null) inode=26790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=150 name=(null) inode=26716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=151 name=(null) inode=26791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=152 name=(null) inode=26791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=153 name=(null) inode=26792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=154 name=(null) inode=26791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=155 name=(null) inode=26793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=156 name=(null) inode=26791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=157 name=(null) inode=26794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=158 name=(null) inode=26791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=159 name=(null) inode=26795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=160 name=(null) inode=26791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=161 name=(null) inode=26796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=162 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=163 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=164 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=165 name=(null) inode=26798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=166 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=167 name=(null) inode=26799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=168 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=169 name=(null) inode=26800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=170 name=(null) inode=26800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=171 name=(null) inode=26801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=172 name=(null) inode=26800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=173 name=(null) inode=26802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=174 name=(null) inode=26800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=175 name=(null) inode=26803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=176 name=(null) inode=26800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=177 name=(null) inode=26804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=178 name=(null) inode=26800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=179 name=(null) inode=26805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=180 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=181 name=(null) inode=26806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=182 name=(null) inode=26806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=183 name=(null) inode=26807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=184 name=(null) inode=26806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=185 name=(null) inode=26808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=186 name=(null) inode=26806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=187 name=(null) inode=26809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=188 name=(null) inode=26806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=189 name=(null) inode=26810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=190 name=(null) inode=26806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=191 name=(null) inode=26811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=192 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=193 name=(null) inode=26812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=194 name=(null) inode=26812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=195 name=(null) inode=26813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=196 name=(null) inode=26812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=197 name=(null) inode=26814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=198 name=(null) inode=26812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=199 name=(null) inode=26815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=200 name=(null) inode=26812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=201 name=(null) inode=26816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=202 name=(null) inode=26812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=203 name=(null) inode=26817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=204 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=205 name=(null) inode=26818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=206 name=(null) inode=26818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=207 name=(null) inode=26819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=208 name=(null) inode=26818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=209 name=(null) inode=26820 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=210 name=(null) inode=26818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=211 name=(null) inode=26821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=212 name=(null) inode=26818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=213 name=(null) inode=26822 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=214 name=(null) inode=26818 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=215 name=(null) inode=26823 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=216 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=217 name=(null) inode=26824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=218 name=(null) inode=26824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=219 name=(null) inode=26825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=220 name=(null) inode=26824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=221 name=(null) inode=26826 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=222 name=(null) inode=26824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=223 name=(null) inode=26827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=224 name=(null) inode=26824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=225 name=(null) inode=26828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=226 name=(null) inode=26824 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=227 name=(null) inode=26829 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=228 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=229 name=(null) inode=26830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=230 name=(null) inode=26830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=231 name=(null) inode=26831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=232 name=(null) inode=26830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=233 name=(null) inode=26832 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=234 name=(null) inode=26830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=235 name=(null) inode=26833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=236 name=(null) inode=26830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=237 name=(null) inode=26834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=238 name=(null) inode=26830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=239 name=(null) inode=26835 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=240 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=241 name=(null) inode=26836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=242 name=(null) inode=26836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=243 name=(null) inode=26837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=244 name=(null) inode=26836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=245 name=(null) inode=26838 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=246 name=(null) inode=26836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=247 name=(null) inode=26839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=248 name=(null) inode=26836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=249 name=(null) inode=26840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=250 name=(null) inode=26836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=251 name=(null) inode=26841 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=252 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=253 name=(null) inode=26842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=254 name=(null) inode=26842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=255 name=(null) inode=26843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=256 name=(null) inode=26842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=257 name=(null) inode=26844 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=258 name=(null) inode=26842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=259 name=(null) inode=26845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=260 name=(null) inode=26842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=261 name=(null) inode=26846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=262 name=(null) inode=26842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=263 name=(null) inode=26847 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=264 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=265 name=(null) inode=26848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=266 name=(null) inode=26848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=267 name=(null) inode=26849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=268 name=(null) inode=26848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=269 name=(null) inode=26850 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=270 name=(null) inode=26848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=271 name=(null) inode=26851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=272 name=(null) inode=26848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=273 name=(null) inode=26852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=274 name=(null) inode=26848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=275 name=(null) inode=26853 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=276 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=277 name=(null) inode=26854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=278 name=(null) inode=26854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=279 name=(null) inode=26855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=280 name=(null) inode=26854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=281 name=(null) inode=26856 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=282 name=(null) inode=26854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=283 name=(null) inode=26857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=284 name=(null) inode=26854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=285 name=(null) inode=26858 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=286 name=(null) inode=26854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=287 name=(null) inode=26859 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=288 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=289 name=(null) inode=26860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=290 name=(null) inode=26860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=291 name=(null) inode=26861 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=292 name=(null) inode=26860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=293 name=(null) inode=26862 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=294 name=(null) inode=26860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=295 name=(null) inode=26863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=296 name=(null) inode=26860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=297 name=(null) inode=26864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=298 name=(null) inode=26860 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=299 name=(null) inode=26865 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=300 name=(null) inode=26797 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=301 name=(null) inode=26866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=302 name=(null) inode=26866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=303 name=(null) inode=26867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=304 name=(null) inode=26866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=305 name=(null) inode=26868 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=306 name=(null) inode=26866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=307 name=(null) inode=26869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=308 name=(null) inode=26866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=309 name=(null) inode=26870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=310 name=(null) inode=26866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PATH item=311 name=(null) inode=26871 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:36:24.264000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 20:36:24.463907 systemd[1]: Started systemd-userdbd.service. Apr 12 20:36:24.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:24.531333 kernel: ipmi_si: IPMI System Interface driver Apr 12 20:36:24.531395 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 20:36:24.531585 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 20:36:24.571091 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 20:36:24.590411 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 20:36:24.590561 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 20:36:24.633307 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 20:36:24.671960 systemd-networkd[1315]: bond0: netdev ready Apr 12 20:36:24.673395 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 20:36:24.673505 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 20:36:24.673527 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 20:36:24.674263 systemd-networkd[1315]: lo: Link UP Apr 12 20:36:24.674267 systemd-networkd[1315]: lo: Gained carrier Apr 12 20:36:24.674912 systemd-networkd[1315]: Enumeration completed Apr 12 20:36:24.674980 systemd[1]: Started systemd-networkd.service. Apr 12 20:36:24.675237 systemd-networkd[1315]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 20:36:24.675835 systemd-networkd[1315]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:7b:7d.network. Apr 12 20:36:24.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:24.754287 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Apr 12 20:36:24.754385 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 20:36:24.754469 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Apr 12 20:36:24.773350 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Apr 12 20:36:24.844353 kernel: intel_rapl_common: Found RAPL domain package Apr 12 20:36:24.844386 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 20:36:24.844478 kernel: intel_rapl_common: Found RAPL domain core Apr 12 20:36:24.881363 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Apr 12 20:36:24.881390 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 20:36:24.882563 systemd-networkd[1315]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:7b:7c.network. Apr 12 20:36:24.899383 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:36:24.967307 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 20:36:24.986357 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 20:36:25.045354 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:36:25.045434 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 20:36:25.085492 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Apr 12 20:36:25.105307 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 20:36:25.115972 systemd-networkd[1315]: bond0: Link UP Apr 12 20:36:25.116176 systemd-networkd[1315]: enp1s0f1np1: Link UP Apr 12 20:36:25.116349 systemd-networkd[1315]: enp1s0f1np1: Gained carrier Apr 12 20:36:25.117481 systemd-networkd[1315]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:7b:7c.network. Apr 12 20:36:25.161246 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:36:25.161287 kernel: bond0: active interface up! Apr 12 20:36:25.183306 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 20:36:25.206530 systemd[1]: Finished systemd-udev-settle.service. Apr 12 20:36:25.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.215067 systemd[1]: Starting lvm2-activation-early.service... Apr 12 20:36:25.231593 lvm[1381]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:36:25.265725 systemd[1]: Finished lvm2-activation-early.service. Apr 12 20:36:25.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.273434 systemd[1]: Reached target cryptsetup.target. Apr 12 20:36:25.281949 systemd[1]: Starting lvm2-activation.service... Apr 12 20:36:25.284044 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:36:25.310305 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.333304 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.356304 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.361764 systemd[1]: Finished lvm2-activation.service. Apr 12 20:36:25.379304 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.395452 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:36:25.402306 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.418418 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 20:36:25.418433 systemd[1]: Reached target local-fs.target. Apr 12 20:36:25.425304 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.447305 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.469304 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.480026 systemd[1]: Reached target machines.target. Apr 12 20:36:25.490306 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.508016 systemd[1]: Starting ldconfig.service... Apr 12 20:36:25.510305 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.526809 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 20:36:25.526828 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:36:25.527509 systemd[1]: Starting systemd-boot-update.service... Apr 12 20:36:25.531306 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.547881 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 20:36:25.551362 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.570890 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 20:36:25.571920 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:36:25.571940 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:36:25.572360 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.572519 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 20:36:25.572777 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1385 (bootctl) Apr 12 20:36:25.573350 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 20:36:25.582188 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:36:25.584099 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:36:25.585287 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:36:25.593366 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.614197 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 20:36:25.614308 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.614540 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 20:36:25.636384 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.636822 systemd-networkd[1315]: enp1s0f0np0: Link UP Apr 12 20:36:25.636980 systemd-networkd[1315]: bond0: Gained carrier Apr 12 20:36:25.637068 systemd-networkd[1315]: enp1s0f0np0: Gained carrier Apr 12 20:36:25.656315 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:36:25.656430 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Apr 12 20:36:25.657701 systemd-networkd[1315]: enp1s0f1np1: Link DOWN Apr 12 20:36:25.657704 systemd-networkd[1315]: enp1s0f1np1: Lost carrier Apr 12 20:36:25.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.671505 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 20:36:25.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.722605 systemd-fsck[1393]: fsck.fat 4.2 (2021-01-31) Apr 12 20:36:25.722605 systemd-fsck[1393]: /dev/sdb1: 789 files, 119240/258078 clusters Apr 12 20:36:25.723397 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 20:36:25.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.735211 systemd[1]: Mounting boot.mount... Apr 12 20:36:25.746160 systemd[1]: Mounted boot.mount. Apr 12 20:36:25.763048 systemd[1]: Finished systemd-boot-update.service. Apr 12 20:36:25.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.796391 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 20:36:25.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:25.805111 systemd[1]: Starting audit-rules.service... Apr 12 20:36:25.811863 systemd[1]: Starting clean-ca-certificates.service... Apr 12 20:36:25.814564 ldconfig[1383]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 20:36:25.820901 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 20:36:25.824000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 20:36:25.824000 audit[1413]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1ed6c510 a2=420 a3=0 items=0 ppid=1396 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:25.824000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 20:36:25.824601 augenrules[1413]: No rules Apr 12 20:36:25.841945 systemd[1]: Starting systemd-resolved.service... Apr 12 20:36:25.842306 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 20:36:25.860337 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Apr 12 20:36:25.860378 systemd[1]: Starting systemd-timesyncd.service... Apr 12 20:36:25.860869 systemd-networkd[1315]: enp1s0f1np1: Link UP Apr 12 20:36:25.861023 systemd-networkd[1315]: enp1s0f1np1: Gained carrier Apr 12 20:36:25.880359 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Apr 12 20:36:25.889913 systemd[1]: Starting systemd-update-utmp.service... Apr 12 20:36:25.898331 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:36:25.905663 systemd[1]: Finished ldconfig.service. Apr 12 20:36:25.912522 systemd[1]: Finished audit-rules.service. Apr 12 20:36:25.919500 systemd[1]: Finished clean-ca-certificates.service. Apr 12 20:36:25.927505 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 20:36:25.939111 systemd[1]: Starting systemd-update-done.service... Apr 12 20:36:25.945404 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 20:36:25.945782 systemd[1]: Finished systemd-update-done.service. Apr 12 20:36:25.955146 systemd[1]: Finished systemd-update-utmp.service. Apr 12 20:36:25.964252 systemd[1]: Started systemd-timesyncd.service. Apr 12 20:36:25.965788 systemd-resolved[1418]: Positive Trust Anchors: Apr 12 20:36:25.965794 systemd-resolved[1418]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:36:25.965813 systemd-resolved[1418]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:36:25.969849 systemd-resolved[1418]: Using system hostname 'ci-3510.3.3-a-413b88e4ca'. Apr 12 20:36:25.972481 systemd[1]: Started systemd-resolved.service. Apr 12 20:36:25.980429 systemd[1]: Reached target network.target. Apr 12 20:36:25.989384 systemd[1]: Reached target nss-lookup.target. Apr 12 20:36:25.997395 systemd[1]: Reached target sysinit.target. Apr 12 20:36:26.005415 systemd[1]: Started motdgen.path. Apr 12 20:36:26.012403 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 20:36:26.022385 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 20:36:26.030378 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 20:36:26.030393 systemd[1]: Reached target paths.target. Apr 12 20:36:26.037378 systemd[1]: Reached target time-set.target. Apr 12 20:36:26.045444 systemd[1]: Started logrotate.timer. Apr 12 20:36:26.052418 systemd[1]: Started mdadm.timer. Apr 12 20:36:26.059382 systemd[1]: Reached target timers.target. Apr 12 20:36:26.066494 systemd[1]: Listening on dbus.socket. Apr 12 20:36:26.073859 systemd[1]: Starting docker.socket... Apr 12 20:36:26.081651 systemd[1]: Listening on sshd.socket. Apr 12 20:36:26.088432 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:36:26.088653 systemd[1]: Listening on docker.socket. Apr 12 20:36:26.095446 systemd[1]: Reached target sockets.target. Apr 12 20:36:26.103369 systemd[1]: Reached target basic.target. Apr 12 20:36:26.110400 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:36:26.110414 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:36:26.110855 systemd[1]: Starting containerd.service... Apr 12 20:36:26.117792 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 20:36:26.126843 systemd[1]: Starting coreos-metadata.service... Apr 12 20:36:26.133862 systemd[1]: Starting dbus.service... Apr 12 20:36:26.139890 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 20:36:26.144555 jq[1433]: false Apr 12 20:36:26.146309 coreos-metadata[1426]: Apr 12 20:36:26.146 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:36:26.147975 systemd[1]: Starting extend-filesystems.service... Apr 12 20:36:26.153710 dbus-daemon[1432]: [system] SELinux support is enabled Apr 12 20:36:26.155404 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 20:36:26.155963 systemd[1]: Starting motdgen.service... Apr 12 20:36:26.156367 extend-filesystems[1435]: Found sda Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb1 Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb2 Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb3 Apr 12 20:36:26.178403 extend-filesystems[1435]: Found usr Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb4 Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb6 Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb7 Apr 12 20:36:26.178403 extend-filesystems[1435]: Found sdb9 Apr 12 20:36:26.178403 extend-filesystems[1435]: Checking size of /dev/sdb9 Apr 12 20:36:26.178403 extend-filesystems[1435]: Resized partition /dev/sdb9 Apr 12 20:36:26.276329 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Apr 12 20:36:26.276359 coreos-metadata[1429]: Apr 12 20:36:26.157 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:36:26.164203 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 20:36:26.276513 extend-filesystems[1450]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 20:36:26.197114 systemd[1]: Starting prepare-critools.service... Apr 12 20:36:26.283981 systemd[1]: Starting prepare-helm.service... Apr 12 20:36:26.298866 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 20:36:26.305870 systemd[1]: Starting sshd-keygen.service... Apr 12 20:36:26.313639 systemd[1]: Starting systemd-logind.service... Apr 12 20:36:26.320399 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:36:26.320906 systemd[1]: Starting tcsd.service... Apr 12 20:36:26.326657 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 20:36:26.326977 systemd[1]: Starting update-engine.service... Apr 12 20:36:26.333861 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 20:36:26.334575 systemd-logind[1463]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 20:36:26.334586 systemd-logind[1463]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 20:36:26.334596 systemd-logind[1463]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 20:36:26.334743 systemd-logind[1463]: New seat seat0. Apr 12 20:36:26.335799 jq[1466]: true Apr 12 20:36:26.343692 systemd[1]: Started dbus.service. Apr 12 20:36:26.353147 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 20:36:26.353236 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 20:36:26.353418 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 20:36:26.353498 systemd[1]: Finished motdgen.service. Apr 12 20:36:26.362461 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 20:36:26.362542 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 20:36:26.368362 tar[1468]: ./ Apr 12 20:36:26.368362 tar[1468]: ./loopback Apr 12 20:36:26.369808 update_engine[1465]: I0412 20:36:26.369336 1465 main.cc:92] Flatcar Update Engine starting Apr 12 20:36:26.372628 update_engine[1465]: I0412 20:36:26.372613 1465 update_check_scheduler.cc:74] Next update check in 3m14s Apr 12 20:36:26.372995 jq[1474]: true Apr 12 20:36:26.373984 dbus-daemon[1432]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 20:36:26.375369 tar[1469]: crictl Apr 12 20:36:26.376959 tar[1470]: linux-amd64/helm Apr 12 20:36:26.379870 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 20:36:26.379984 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 20:36:26.383161 env[1475]: time="2024-04-12T20:36:26.383130815Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 20:36:26.385471 systemd[1]: Started systemd-logind.service. Apr 12 20:36:26.387973 tar[1468]: ./bandwidth Apr 12 20:36:26.393518 systemd[1]: Started update-engine.service. Apr 12 20:36:26.393700 env[1475]: time="2024-04-12T20:36:26.393569264Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 20:36:26.394101 env[1475]: time="2024-04-12T20:36:26.394063826Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:36:26.394695 env[1475]: time="2024-04-12T20:36:26.394678670Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:36:26.394695 env[1475]: time="2024-04-12T20:36:26.394694449Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396393 env[1475]: time="2024-04-12T20:36:26.396379093Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396393 env[1475]: time="2024-04-12T20:36:26.396391941Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396446 env[1475]: time="2024-04-12T20:36:26.396400320Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 20:36:26.396446 env[1475]: time="2024-04-12T20:36:26.396406587Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396476 env[1475]: time="2024-04-12T20:36:26.396448335Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396590 env[1475]: time="2024-04-12T20:36:26.396575958Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396673 env[1475]: time="2024-04-12T20:36:26.396639594Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:36:26.396673 env[1475]: time="2024-04-12T20:36:26.396649226Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 20:36:26.398529 env[1475]: time="2024-04-12T20:36:26.398517105Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 20:36:26.398560 env[1475]: time="2024-04-12T20:36:26.398529539Z" level=info msg="metadata content store policy set" policy=shared Apr 12 20:36:26.402975 bash[1498]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:36:26.403184 systemd[1]: Started locksmithd.service. Apr 12 20:36:26.408137 env[1475]: time="2024-04-12T20:36:26.408123202Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 20:36:26.408178 env[1475]: time="2024-04-12T20:36:26.408141225Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 20:36:26.408178 env[1475]: time="2024-04-12T20:36:26.408151109Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 20:36:26.408178 env[1475]: time="2024-04-12T20:36:26.408168305Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408178 env[1475]: time="2024-04-12T20:36:26.408176371Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408184346Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408191187Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408200017Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408207917Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408215566Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408222427Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408280 env[1475]: time="2024-04-12T20:36:26.408229045Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 20:36:26.408404 env[1475]: time="2024-04-12T20:36:26.408281417Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 20:36:26.408404 env[1475]: time="2024-04-12T20:36:26.408333802Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 20:36:26.408475 env[1475]: time="2024-04-12T20:36:26.408467094Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 20:36:26.408494 env[1475]: time="2024-04-12T20:36:26.408482607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.408494 env[1475]: time="2024-04-12T20:36:26.408490405Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 20:36:26.408526 env[1475]: time="2024-04-12T20:36:26.408517586Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.408786 env[1475]: time="2024-04-12T20:36:26.408737638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.408866 env[1475]: time="2024-04-12T20:36:26.408853527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.408898 env[1475]: time="2024-04-12T20:36:26.408870550Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.408898 env[1475]: time="2024-04-12T20:36:26.408881700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.408983 env[1475]: time="2024-04-12T20:36:26.408925476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409019 env[1475]: time="2024-04-12T20:36:26.408989803Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409019 env[1475]: time="2024-04-12T20:36:26.409004823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409081 env[1475]: time="2024-04-12T20:36:26.409020255Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 20:36:26.409128 env[1475]: time="2024-04-12T20:36:26.409118606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409165 env[1475]: time="2024-04-12T20:36:26.409132560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409165 env[1475]: time="2024-04-12T20:36:26.409145618Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409165 env[1475]: time="2024-04-12T20:36:26.409157905Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 20:36:26.409242 env[1475]: time="2024-04-12T20:36:26.409171447Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 20:36:26.409242 env[1475]: time="2024-04-12T20:36:26.409187520Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 20:36:26.409242 env[1475]: time="2024-04-12T20:36:26.409203604Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 20:36:26.409242 env[1475]: time="2024-04-12T20:36:26.409232095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 20:36:26.409421 env[1475]: time="2024-04-12T20:36:26.409392109Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409429578Z" level=info msg="Connect containerd service" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409457321Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409743622Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409847053Z" level=info msg="Start subscribing containerd event" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409881366Z" level=info msg="Start recovering state" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409856292Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409929786Z" level=info msg="Start event monitor" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409930537Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409940662Z" level=info msg="Start snapshots syncer" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409947827Z" level=info msg="Start cni network conf syncer for default" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409957137Z" level=info msg="Start streaming server" Apr 12 20:36:26.411876 env[1475]: time="2024-04-12T20:36:26.409958532Z" level=info msg="containerd successfully booted in 0.027205s" Apr 12 20:36:26.410487 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 20:36:26.410620 systemd[1]: Reached target system-config.target. Apr 12 20:36:26.418465 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 20:36:26.418579 systemd[1]: Reached target user-config.target. Apr 12 20:36:26.421344 tar[1468]: ./ptp Apr 12 20:36:26.428866 systemd[1]: Started containerd.service. Apr 12 20:36:26.435664 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 20:36:26.444502 tar[1468]: ./vlan Apr 12 20:36:26.461792 locksmithd[1509]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 20:36:26.466676 tar[1468]: ./host-device Apr 12 20:36:26.487967 tar[1468]: ./tuning Apr 12 20:36:26.506765 tar[1468]: ./vrf Apr 12 20:36:26.526431 tar[1468]: ./sbr Apr 12 20:36:26.545699 tar[1468]: ./tap Apr 12 20:36:26.567757 tar[1468]: ./dhcp Apr 12 20:36:26.623730 tar[1468]: ./static Apr 12 20:36:26.630982 tar[1470]: linux-amd64/LICENSE Apr 12 20:36:26.631039 tar[1470]: linux-amd64/README.md Apr 12 20:36:26.633458 systemd[1]: Finished prepare-helm.service. Apr 12 20:36:26.639667 tar[1468]: ./firewall Apr 12 20:36:26.643968 systemd[1]: Finished prepare-critools.service. Apr 12 20:36:26.664084 tar[1468]: ./macvlan Apr 12 20:36:26.671308 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Apr 12 20:36:26.698660 extend-filesystems[1450]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Apr 12 20:36:26.698660 extend-filesystems[1450]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 20:36:26.698660 extend-filesystems[1450]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Apr 12 20:36:26.737362 extend-filesystems[1435]: Resized filesystem in /dev/sdb9 Apr 12 20:36:26.745356 tar[1468]: ./dummy Apr 12 20:36:26.745356 tar[1468]: ./bridge Apr 12 20:36:26.699073 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 20:36:26.699158 systemd[1]: Finished extend-filesystems.service. Apr 12 20:36:26.759239 tar[1468]: ./ipvlan Apr 12 20:36:26.781073 tar[1468]: ./portmap Apr 12 20:36:26.801397 tar[1468]: ./host-local Apr 12 20:36:26.808324 sshd_keygen[1462]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 20:36:26.820229 systemd[1]: Finished sshd-keygen.service. Apr 12 20:36:26.829622 systemd[1]: Starting issuegen.service... Apr 12 20:36:26.837741 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 20:36:26.846644 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 20:36:26.846741 systemd[1]: Finished issuegen.service. Apr 12 20:36:26.854221 systemd[1]: Starting systemd-user-sessions.service... Apr 12 20:36:26.863713 systemd[1]: Finished systemd-user-sessions.service. Apr 12 20:36:26.873189 systemd[1]: Started getty@tty1.service. Apr 12 20:36:26.881155 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 20:36:26.889615 systemd[1]: Reached target getty.target. Apr 12 20:36:26.991609 systemd-networkd[1315]: bond0: Gained IPv6LL Apr 12 20:36:27.005418 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 20:36:31.903188 login[1537]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:36:31.910689 login[1536]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:36:31.910733 systemd[1]: Created slice user-500.slice. Apr 12 20:36:31.911399 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 20:36:31.912452 systemd-logind[1463]: New session 1 of user core. Apr 12 20:36:31.914298 systemd-logind[1463]: New session 2 of user core. Apr 12 20:36:31.916528 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 20:36:31.917173 systemd[1]: Starting user@500.service... Apr 12 20:36:31.927078 (systemd)[1541]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:32.001811 systemd[1541]: Queued start job for default target default.target. Apr 12 20:36:32.002054 systemd[1541]: Reached target paths.target. Apr 12 20:36:32.002065 systemd[1541]: Reached target sockets.target. Apr 12 20:36:32.002073 systemd[1541]: Reached target timers.target. Apr 12 20:36:32.002080 systemd[1541]: Reached target basic.target. Apr 12 20:36:32.002101 systemd[1541]: Reached target default.target. Apr 12 20:36:32.002116 systemd[1541]: Startup finished in 71ms. Apr 12 20:36:32.002145 systemd[1]: Started user@500.service. Apr 12 20:36:32.002780 systemd[1]: Started session-1.scope. Apr 12 20:36:32.003172 systemd[1]: Started session-2.scope. Apr 12 20:36:32.112267 coreos-metadata[1429]: Apr 12 20:36:32.112 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:36:32.112806 coreos-metadata[1426]: Apr 12 20:36:32.112 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:36:33.112772 coreos-metadata[1426]: Apr 12 20:36:33.112 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:36:33.113825 coreos-metadata[1429]: Apr 12 20:36:33.112 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:36:33.214364 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Apr 12 20:36:33.221341 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Apr 12 20:36:34.168962 systemd[1]: Created slice system-sshd.slice. Apr 12 20:36:34.169626 systemd[1]: Started sshd@0-139.178.91.217:22-147.75.109.163:54062.service. Apr 12 20:36:34.183682 coreos-metadata[1429]: Apr 12 20:36:34.183 INFO Fetch successful Apr 12 20:36:34.184366 coreos-metadata[1426]: Apr 12 20:36:34.184 INFO Fetch successful Apr 12 20:36:34.206920 systemd[1]: Finished coreos-metadata.service. Apr 12 20:36:34.207825 systemd[1]: Started packet-phone-home.service. Apr 12 20:36:34.213509 unknown[1426]: wrote ssh authorized keys file for user: core Apr 12 20:36:34.215753 sshd[1562]: Accepted publickey for core from 147.75.109.163 port 54062 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:34.216470 sshd[1562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:34.218104 curl[1566]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 20:36:34.218219 curl[1566]: Dload Upload Total Spent Left Speed Apr 12 20:36:34.219156 systemd-logind[1463]: New session 3 of user core. Apr 12 20:36:34.219678 systemd[1]: Started session-3.scope. Apr 12 20:36:34.226709 update-ssh-keys[1567]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:36:34.226911 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 20:36:34.227065 systemd[1]: Reached target multi-user.target. Apr 12 20:36:34.227729 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 20:36:34.231725 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 20:36:34.231797 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 20:36:34.231928 systemd[1]: Startup finished in 1.848s (kernel) + 24.633s (initrd) + 14.770s (userspace) = 41.252s. Apr 12 20:36:34.267059 systemd[1]: Started sshd@1-139.178.91.217:22-147.75.109.163:54074.service. Apr 12 20:36:34.302703 sshd[1573]: Accepted publickey for core from 147.75.109.163 port 54074 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:34.303414 sshd[1573]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:34.305656 systemd-logind[1463]: New session 4 of user core. Apr 12 20:36:34.306145 systemd[1]: Started session-4.scope. Apr 12 20:36:34.856472 systemd-resolved[1418]: Clock change detected. Flushing caches. Apr 12 20:36:34.856480 systemd-timesyncd[1419]: Contacted time server 45.84.199.136:123 (0.flatcar.pool.ntp.org). Apr 12 20:36:34.856505 systemd-timesyncd[1419]: Initial clock synchronization to Fri 2024-04-12 20:36:34.856410 UTC. Apr 12 20:36:34.904543 sshd[1573]: pam_unix(sshd:session): session closed for user core Apr 12 20:36:34.906689 systemd[1]: sshd@1-139.178.91.217:22-147.75.109.163:54074.service: Deactivated successfully. Apr 12 20:36:34.907180 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 20:36:34.907648 systemd-logind[1463]: Session 4 logged out. Waiting for processes to exit. Apr 12 20:36:34.908532 systemd[1]: Started sshd@2-139.178.91.217:22-147.75.109.163:54082.service. Apr 12 20:36:34.909242 systemd-logind[1463]: Removed session 4. Apr 12 20:36:34.950002 curl[1566]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 20:36:34.950628 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 20:36:34.951581 sshd[1579]: Accepted publickey for core from 147.75.109.163 port 54082 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:34.952431 sshd[1579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:34.955035 systemd-logind[1463]: New session 5 of user core. Apr 12 20:36:34.955633 systemd[1]: Started session-5.scope. Apr 12 20:36:35.006496 sshd[1579]: pam_unix(sshd:session): session closed for user core Apr 12 20:36:35.014600 systemd[1]: sshd@2-139.178.91.217:22-147.75.109.163:54082.service: Deactivated successfully. Apr 12 20:36:35.016216 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 20:36:35.017949 systemd-logind[1463]: Session 5 logged out. Waiting for processes to exit. Apr 12 20:36:35.020620 systemd[1]: Started sshd@3-139.178.91.217:22-147.75.109.163:54096.service. Apr 12 20:36:35.022961 systemd-logind[1463]: Removed session 5. Apr 12 20:36:35.061232 sshd[1585]: Accepted publickey for core from 147.75.109.163 port 54096 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:35.061904 sshd[1585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:35.064184 systemd-logind[1463]: New session 6 of user core. Apr 12 20:36:35.064620 systemd[1]: Started session-6.scope. Apr 12 20:36:35.119206 sshd[1585]: pam_unix(sshd:session): session closed for user core Apr 12 20:36:35.124213 systemd[1]: sshd@3-139.178.91.217:22-147.75.109.163:54096.service: Deactivated successfully. Apr 12 20:36:35.125569 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 20:36:35.127390 systemd-logind[1463]: Session 6 logged out. Waiting for processes to exit. Apr 12 20:36:35.129937 systemd[1]: Started sshd@4-139.178.91.217:22-147.75.109.163:54102.service. Apr 12 20:36:35.132174 systemd-logind[1463]: Removed session 6. Apr 12 20:36:35.236582 sshd[1591]: Accepted publickey for core from 147.75.109.163 port 54102 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:35.238517 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:35.244100 systemd-logind[1463]: New session 7 of user core. Apr 12 20:36:35.245346 systemd[1]: Started session-7.scope. Apr 12 20:36:35.314993 sudo[1594]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 20:36:35.315125 sudo[1594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:36:35.327870 dbus-daemon[1432]: \xd0M~n\xf2U: received setenforce notice (enforcing=-1697554576) Apr 12 20:36:35.329262 sudo[1594]: pam_unix(sudo:session): session closed for user root Apr 12 20:36:35.331115 sshd[1591]: pam_unix(sshd:session): session closed for user core Apr 12 20:36:35.333422 systemd[1]: sshd@4-139.178.91.217:22-147.75.109.163:54102.service: Deactivated successfully. Apr 12 20:36:35.333943 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 20:36:35.334453 systemd-logind[1463]: Session 7 logged out. Waiting for processes to exit. Apr 12 20:36:35.335336 systemd[1]: Started sshd@5-139.178.91.217:22-147.75.109.163:54106.service. Apr 12 20:36:35.336002 systemd-logind[1463]: Removed session 7. Apr 12 20:36:35.372295 sshd[1598]: Accepted publickey for core from 147.75.109.163 port 54106 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:35.373187 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:35.375919 systemd-logind[1463]: New session 8 of user core. Apr 12 20:36:35.376550 systemd[1]: Started session-8.scope. Apr 12 20:36:35.438285 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 20:36:35.438923 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:36:35.445998 sudo[1602]: pam_unix(sudo:session): session closed for user root Apr 12 20:36:35.458386 sudo[1601]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 20:36:35.458995 sudo[1601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:36:35.483075 systemd[1]: Stopping audit-rules.service... Apr 12 20:36:35.485000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:36:35.486168 auditctl[1605]: No rules Apr 12 20:36:35.487050 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 20:36:35.487473 systemd[1]: Stopped audit-rules.service. Apr 12 20:36:35.491248 systemd[1]: Starting audit-rules.service... Apr 12 20:36:35.491466 kernel: kauditd_printk_skb: 366 callbacks suppressed Apr 12 20:36:35.491506 kernel: audit: type=1305 audit(1712954195.485:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:36:35.500582 augenrules[1622]: No rules Apr 12 20:36:35.500917 systemd[1]: Finished audit-rules.service. Apr 12 20:36:35.501309 sudo[1601]: pam_unix(sudo:session): session closed for user root Apr 12 20:36:35.502049 sshd[1598]: pam_unix(sshd:session): session closed for user core Apr 12 20:36:35.503443 systemd[1]: sshd@5-139.178.91.217:22-147.75.109.163:54106.service: Deactivated successfully. Apr 12 20:36:35.503726 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 20:36:35.504083 systemd-logind[1463]: Session 8 logged out. Waiting for processes to exit. Apr 12 20:36:35.504569 systemd[1]: Started sshd@6-139.178.91.217:22-147.75.109.163:54110.service. Apr 12 20:36:35.505011 systemd-logind[1463]: Removed session 8. Apr 12 20:36:35.485000 audit[1605]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4084b9b0 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:35.538004 kernel: audit: type=1300 audit(1712954195.485:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4084b9b0 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:35.538047 kernel: audit: type=1327 audit(1712954195.485:166): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:36:35.485000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:36:35.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.569964 kernel: audit: type=1131 audit(1712954195.486:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.570013 kernel: audit: type=1130 audit(1712954195.500:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.577214 sshd[1628]: Accepted publickey for core from 147.75.109.163 port 54110 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:36:35.578544 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:36:35.580963 systemd-logind[1463]: New session 9 of user core. Apr 12 20:36:35.581377 systemd[1]: Started session-9.scope. Apr 12 20:36:35.500000 audit[1601]: USER_END pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.618385 kernel: audit: type=1106 audit(1712954195.500:169): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.618426 kernel: audit: type=1104 audit(1712954195.500:170): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.500000 audit[1601]: CRED_DISP pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.628146 sudo[1631]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 20:36:35.628257 sudo[1631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:36:35.501000 audit[1598]: USER_END pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.674153 kernel: audit: type=1106 audit(1712954195.501:171): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.674202 kernel: audit: type=1104 audit(1712954195.501:172): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.501000 audit[1598]: CRED_DISP pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.91.217:22-147.75.109.163:54106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.725665 kernel: audit: type=1131 audit(1712954195.502:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.91.217:22-147.75.109.163:54106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.217:22-147.75.109.163:54110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.576000 audit[1628]: USER_ACCT pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.577000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.577000 audit[1628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d3df510 a2=3 a3=0 items=0 ppid=1 pid=1628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:35.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:36:35.582000 audit[1628]: USER_START pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.583000 audit[1630]: CRED_ACQ pid=1630 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:36:35.627000 audit[1631]: USER_ACCT pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.627000 audit[1631]: CRED_REFR pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:35.628000 audit[1631]: USER_START pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:36:36.534916 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 20:36:36.538824 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 20:36:36.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:36.539004 systemd[1]: Reached target network-online.target. Apr 12 20:36:36.539667 systemd[1]: Starting docker.service... Apr 12 20:36:36.558952 env[1651]: time="2024-04-12T20:36:36.558889931Z" level=info msg="Starting up" Apr 12 20:36:36.559670 env[1651]: time="2024-04-12T20:36:36.559634179Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:36:36.559670 env[1651]: time="2024-04-12T20:36:36.559644326Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:36:36.559670 env[1651]: time="2024-04-12T20:36:36.559657554Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:36:36.559670 env[1651]: time="2024-04-12T20:36:36.559664783Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:36:36.560598 env[1651]: time="2024-04-12T20:36:36.560551263Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:36:36.560598 env[1651]: time="2024-04-12T20:36:36.560561307Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:36:36.560598 env[1651]: time="2024-04-12T20:36:36.560570824Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:36:36.560598 env[1651]: time="2024-04-12T20:36:36.560576780Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:36:36.725397 env[1651]: time="2024-04-12T20:36:36.725331423Z" level=info msg="Loading containers: start." Apr 12 20:36:36.762000 audit[1693]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.762000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff318c7a40 a2=0 a3=7fff318c7a2c items=0 ppid=1651 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 20:36:36.763000 audit[1695]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.763000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc8b4b5b80 a2=0 a3=7ffc8b4b5b6c items=0 ppid=1651 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 20:36:36.764000 audit[1697]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.764000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff590c7b30 a2=0 a3=7fff590c7b1c items=0 ppid=1651 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 20:36:36.765000 audit[1699]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.765000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd29695930 a2=0 a3=7ffd2969591c items=0 ppid=1651 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 20:36:36.767000 audit[1701]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.767000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3206e3c0 a2=0 a3=7ffd3206e3ac items=0 ppid=1651 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 20:36:36.800000 audit[1706]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.800000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd528af850 a2=0 a3=7ffd528af83c items=0 ppid=1651 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 20:36:36.806000 audit[1708]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.806000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff977cfc40 a2=0 a3=7fff977cfc2c items=0 ppid=1651 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 20:36:36.809000 audit[1710]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.809000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffa5e29280 a2=0 a3=7fffa5e2926c items=0 ppid=1651 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 20:36:36.812000 audit[1712]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.812000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffb8498e90 a2=0 a3=7fffb8498e7c items=0 ppid=1651 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.812000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:36:36.825000 audit[1716]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.825000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffff377afd0 a2=0 a3=7ffff377afbc items=0 ppid=1651 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:36:36.828000 audit[1717]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.828000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffad761440 a2=0 a3=7fffad76142c items=0 ppid=1651 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:36:36.860751 kernel: Initializing XFRM netlink socket Apr 12 20:36:36.894036 env[1651]: time="2024-04-12T20:36:36.894019246Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 20:36:36.905000 audit[1725]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.905000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeec43acc0 a2=0 a3=7ffeec43acac items=0 ppid=1651 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.905000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 20:36:36.929000 audit[1728]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.929000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc97c94010 a2=0 a3=7ffc97c93ffc items=0 ppid=1651 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 20:36:36.931000 audit[1731]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.931000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd95538fe0 a2=0 a3=7ffd95538fcc items=0 ppid=1651 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.931000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 20:36:36.932000 audit[1733]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.932000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe52b3ebf0 a2=0 a3=7ffe52b3ebdc items=0 ppid=1651 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 20:36:36.933000 audit[1735]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.933000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffccbd53950 a2=0 a3=7ffccbd5393c items=0 ppid=1651 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.933000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 20:36:36.934000 audit[1737]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.934000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc51a6c230 a2=0 a3=7ffc51a6c21c items=0 ppid=1651 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 20:36:36.935000 audit[1739]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.935000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff86144140 a2=0 a3=7fff8614412c items=0 ppid=1651 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 20:36:36.942000 audit[1742]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.942000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff86dcf6b0 a2=0 a3=7fff86dcf69c items=0 ppid=1651 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 20:36:36.943000 audit[1744]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.943000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffef7a85f20 a2=0 a3=7ffef7a85f0c items=0 ppid=1651 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.943000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 20:36:36.944000 audit[1746]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.944000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdceb3c3c0 a2=0 a3=7ffdceb3c3ac items=0 ppid=1651 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 20:36:36.946000 audit[1748]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.946000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdba435f80 a2=0 a3=7ffdba435f6c items=0 ppid=1651 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 20:36:36.947033 systemd-networkd[1315]: docker0: Link UP Apr 12 20:36:36.950000 audit[1752]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.950000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc4a5dec0 a2=0 a3=7ffcc4a5deac items=0 ppid=1651 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:36:36.951000 audit[1753]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:36.951000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc4bb205c0 a2=0 a3=7ffc4bb205ac items=0 ppid=1651 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:36.951000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:36:36.952455 env[1651]: time="2024-04-12T20:36:36.952436160Z" level=info msg="Loading containers: done." Apr 12 20:36:36.962284 env[1651]: time="2024-04-12T20:36:36.962231768Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 20:36:36.962411 env[1651]: time="2024-04-12T20:36:36.962380306Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 20:36:36.962500 env[1651]: time="2024-04-12T20:36:36.962462098Z" level=info msg="Daemon has completed initialization" Apr 12 20:36:36.973576 systemd[1]: Started docker.service. Apr 12 20:36:36.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:36.982271 env[1651]: time="2024-04-12T20:36:36.982187694Z" level=info msg="API listen on /run/docker.sock" Apr 12 20:36:37.016595 systemd[1]: Reloading. Apr 12 20:36:37.080503 /usr/lib/systemd/system-generators/torcx-generator[1804]: time="2024-04-12T20:36:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:36:37.080522 /usr/lib/systemd/system-generators/torcx-generator[1804]: time="2024-04-12T20:36:37Z" level=info msg="torcx already run" Apr 12 20:36:37.152352 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:36:37.152365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:36:37.168989 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.211000 audit: BPF prog-id=34 op=LOAD Apr 12 20:36:37.211000 audit: BPF prog-id=29 op=UNLOAD Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit: BPF prog-id=35 op=LOAD Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit: BPF prog-id=36 op=LOAD Apr 12 20:36:37.212000 audit: BPF prog-id=30 op=UNLOAD Apr 12 20:36:37.212000 audit: BPF prog-id=31 op=UNLOAD Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.212000 audit: BPF prog-id=37 op=LOAD Apr 12 20:36:37.212000 audit: BPF prog-id=32 op=UNLOAD Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.213000 audit: BPF prog-id=38 op=LOAD Apr 12 20:36:37.213000 audit: BPF prog-id=23 op=UNLOAD Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit: BPF prog-id=39 op=LOAD Apr 12 20:36:37.214000 audit: BPF prog-id=18 op=UNLOAD Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit: BPF prog-id=40 op=LOAD Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit: BPF prog-id=41 op=LOAD Apr 12 20:36:37.215000 audit: BPF prog-id=19 op=UNLOAD Apr 12 20:36:37.215000 audit: BPF prog-id=20 op=UNLOAD Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit: BPF prog-id=42 op=LOAD Apr 12 20:36:37.215000 audit: BPF prog-id=27 op=UNLOAD Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit: BPF prog-id=43 op=LOAD Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.215000 audit: BPF prog-id=44 op=LOAD Apr 12 20:36:37.215000 audit: BPF prog-id=21 op=UNLOAD Apr 12 20:36:37.215000 audit: BPF prog-id=22 op=UNLOAD Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.216000 audit: BPF prog-id=45 op=LOAD Apr 12 20:36:37.216000 audit: BPF prog-id=28 op=UNLOAD Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit: BPF prog-id=46 op=LOAD Apr 12 20:36:37.217000 audit: BPF prog-id=24 op=UNLOAD Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit: BPF prog-id=47 op=LOAD Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:37.218000 audit: BPF prog-id=48 op=LOAD Apr 12 20:36:37.218000 audit: BPF prog-id=25 op=UNLOAD Apr 12 20:36:37.218000 audit: BPF prog-id=26 op=UNLOAD Apr 12 20:36:37.222403 systemd[1]: Started kubelet.service. Apr 12 20:36:37.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:37.246406 kubelet[1863]: E0412 20:36:37.246375 1863 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 20:36:37.247630 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 20:36:37.247699 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 20:36:37.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:36:37.933382 env[1475]: time="2024-04-12T20:36:37.933250138Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 20:36:38.627420 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4151809795.mount: Deactivated successfully. Apr 12 20:36:40.548381 env[1475]: time="2024-04-12T20:36:40.548332971Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:40.549041 env[1475]: time="2024-04-12T20:36:40.548983727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:40.550186 env[1475]: time="2024-04-12T20:36:40.550129301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:40.551185 env[1475]: time="2024-04-12T20:36:40.551138851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:40.552055 env[1475]: time="2024-04-12T20:36:40.552011009Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142\"" Apr 12 20:36:40.557536 env[1475]: time="2024-04-12T20:36:40.557504560Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 20:36:42.735511 env[1475]: time="2024-04-12T20:36:42.735461845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:42.736115 env[1475]: time="2024-04-12T20:36:42.736056646Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:42.737157 env[1475]: time="2024-04-12T20:36:42.737113873Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:42.738063 env[1475]: time="2024-04-12T20:36:42.738020586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:42.738434 env[1475]: time="2024-04-12T20:36:42.738392177Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad\"" Apr 12 20:36:42.747349 env[1475]: time="2024-04-12T20:36:42.747313865Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 20:36:44.210522 env[1475]: time="2024-04-12T20:36:44.210472986Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:44.211511 env[1475]: time="2024-04-12T20:36:44.211473148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:44.212545 env[1475]: time="2024-04-12T20:36:44.212504524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:44.213477 env[1475]: time="2024-04-12T20:36:44.213436560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:44.213919 env[1475]: time="2024-04-12T20:36:44.213877031Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4\"" Apr 12 20:36:44.219668 env[1475]: time="2024-04-12T20:36:44.219651459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 20:36:45.071521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3134009463.mount: Deactivated successfully. Apr 12 20:36:45.424697 env[1475]: time="2024-04-12T20:36:45.424636081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.425475 env[1475]: time="2024-04-12T20:36:45.425435090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.425964 env[1475]: time="2024-04-12T20:36:45.425952046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.426582 env[1475]: time="2024-04-12T20:36:45.426570493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.426929 env[1475]: time="2024-04-12T20:36:45.426900515Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 20:36:45.432383 env[1475]: time="2024-04-12T20:36:45.432351557Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 20:36:45.954943 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount99749001.mount: Deactivated successfully. Apr 12 20:36:45.956288 env[1475]: time="2024-04-12T20:36:45.956240529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.956806 env[1475]: time="2024-04-12T20:36:45.956743616Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.957517 env[1475]: time="2024-04-12T20:36:45.957504039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.958270 env[1475]: time="2024-04-12T20:36:45.958256566Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:45.958426 env[1475]: time="2024-04-12T20:36:45.958413654Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 20:36:45.964803 env[1475]: time="2024-04-12T20:36:45.964769428Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 20:36:46.610874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount158429771.mount: Deactivated successfully. Apr 12 20:36:47.421019 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 20:36:47.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:47.421176 systemd[1]: Stopped kubelet.service. Apr 12 20:36:47.422241 systemd[1]: Started kubelet.service. Apr 12 20:36:47.426789 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 20:36:47.426845 kernel: audit: type=1130 audit(1712954207.420:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:47.447275 kubelet[1952]: E0412 20:36:47.447204 1952 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 20:36:47.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:47.449341 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 20:36:47.449411 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 20:36:47.449780 kernel: audit: type=1131 audit(1712954207.420:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:47.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:47.559621 kernel: audit: type=1130 audit(1712954207.421:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:47.559655 kernel: audit: type=1131 audit(1712954207.448:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:36:47.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:36:50.009140 env[1475]: time="2024-04-12T20:36:50.009083692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.009759 env[1475]: time="2024-04-12T20:36:50.009715090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.010862 env[1475]: time="2024-04-12T20:36:50.010815435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.011850 env[1475]: time="2024-04-12T20:36:50.011804921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.012373 env[1475]: time="2024-04-12T20:36:50.012323038Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Apr 12 20:36:50.019138 env[1475]: time="2024-04-12T20:36:50.019086264Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 20:36:50.478155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount840157991.mount: Deactivated successfully. Apr 12 20:36:50.961960 env[1475]: time="2024-04-12T20:36:50.961917299Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.962622 env[1475]: time="2024-04-12T20:36:50.962581673Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.963442 env[1475]: time="2024-04-12T20:36:50.963401711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.964194 env[1475]: time="2024-04-12T20:36:50.964150983Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:50.964615 env[1475]: time="2024-04-12T20:36:50.964572824Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 20:36:52.700456 systemd[1]: Stopped kubelet.service. Apr 12 20:36:52.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:52.709908 systemd[1]: Reloading. Apr 12 20:36:52.748644 /usr/lib/systemd/system-generators/torcx-generator[2109]: time="2024-04-12T20:36:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:36:52.748670 /usr/lib/systemd/system-generators/torcx-generator[2109]: time="2024-04-12T20:36:52Z" level=info msg="torcx already run" Apr 12 20:36:52.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:52.759800 kernel: audit: type=1130 audit(1712954212.699:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:52.759871 kernel: audit: type=1131 audit(1712954212.699:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:52.840365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:36:52.840373 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:36:52.852780 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.018238 kernel: audit: type=1400 audit(1712954212.896:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.018293 kernel: audit: type=1400 audit(1712954212.896:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.018307 kernel: audit: type=1400 audit(1712954212.896:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.081445 kernel: audit: type=1400 audit(1712954212.896:392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.145070 kernel: audit: type=1400 audit(1712954212.896:393): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.208577 kernel: audit: type=1400 audit(1712954212.896:394): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.272077 kernel: audit: type=1400 audit(1712954212.896:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335685 kernel: audit: type=1400 audit(1712954212.896:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:52.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit: BPF prog-id=49 op=LOAD Apr 12 20:36:53.080000 audit: BPF prog-id=34 op=UNLOAD Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit: BPF prog-id=50 op=LOAD Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.334000 audit: BPF prog-id=51 op=LOAD Apr 12 20:36:53.334000 audit: BPF prog-id=35 op=UNLOAD Apr 12 20:36:53.335000 audit: BPF prog-id=36 op=UNLOAD Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.398000 audit: BPF prog-id=52 op=LOAD Apr 12 20:36:53.399000 audit: BPF prog-id=37 op=UNLOAD Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.399000 audit: BPF prog-id=53 op=LOAD Apr 12 20:36:53.399000 audit: BPF prog-id=38 op=UNLOAD Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit: BPF prog-id=54 op=LOAD Apr 12 20:36:53.401000 audit: BPF prog-id=39 op=UNLOAD Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit: BPF prog-id=55 op=LOAD Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit: BPF prog-id=56 op=LOAD Apr 12 20:36:53.401000 audit: BPF prog-id=40 op=UNLOAD Apr 12 20:36:53.401000 audit: BPF prog-id=41 op=UNLOAD Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit: BPF prog-id=57 op=LOAD Apr 12 20:36:53.401000 audit: BPF prog-id=42 op=UNLOAD Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit: BPF prog-id=58 op=LOAD Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.401000 audit: BPF prog-id=59 op=LOAD Apr 12 20:36:53.401000 audit: BPF prog-id=43 op=UNLOAD Apr 12 20:36:53.401000 audit: BPF prog-id=44 op=UNLOAD Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.402000 audit: BPF prog-id=60 op=LOAD Apr 12 20:36:53.402000 audit: BPF prog-id=45 op=UNLOAD Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit: BPF prog-id=61 op=LOAD Apr 12 20:36:53.403000 audit: BPF prog-id=46 op=UNLOAD Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit: BPF prog-id=62 op=LOAD Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.403000 audit: BPF prog-id=63 op=LOAD Apr 12 20:36:53.403000 audit: BPF prog-id=47 op=UNLOAD Apr 12 20:36:53.403000 audit: BPF prog-id=48 op=UNLOAD Apr 12 20:36:53.411608 systemd[1]: Started kubelet.service. Apr 12 20:36:53.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:53.434066 kubelet[2168]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:36:53.434066 kubelet[2168]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 20:36:53.434066 kubelet[2168]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:36:53.434066 kubelet[2168]: I0412 20:36:53.434050 2168 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 20:36:53.730262 kubelet[2168]: I0412 20:36:53.730219 2168 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 20:36:53.730262 kubelet[2168]: I0412 20:36:53.730231 2168 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 20:36:53.730345 kubelet[2168]: I0412 20:36:53.730335 2168 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 20:36:53.732865 kubelet[2168]: I0412 20:36:53.732851 2168 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 20:36:53.733607 kubelet[2168]: E0412 20:36:53.733567 2168 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.91.217:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.752587 kubelet[2168]: I0412 20:36:53.752550 2168 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 20:36:53.752650 kubelet[2168]: I0412 20:36:53.752645 2168 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 20:36:53.752756 kubelet[2168]: I0412 20:36:53.752728 2168 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 20:36:53.752845 kubelet[2168]: I0412 20:36:53.752758 2168 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 20:36:53.752845 kubelet[2168]: I0412 20:36:53.752764 2168 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 20:36:53.752845 kubelet[2168]: I0412 20:36:53.752837 2168 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:36:53.752896 kubelet[2168]: I0412 20:36:53.752875 2168 kubelet.go:393] "Attempting to sync node with API server" Apr 12 20:36:53.752896 kubelet[2168]: I0412 20:36:53.752883 2168 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 20:36:53.752896 kubelet[2168]: I0412 20:36:53.752895 2168 kubelet.go:309] "Adding apiserver pod source" Apr 12 20:36:53.752957 kubelet[2168]: I0412 20:36:53.752906 2168 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 20:36:53.753382 kubelet[2168]: W0412 20:36:53.753282 2168 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.91.217:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-413b88e4ca&limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.753382 kubelet[2168]: I0412 20:36:53.753351 2168 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 20:36:53.753382 kubelet[2168]: E0412 20:36:53.753376 2168 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.91.217:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-413b88e4ca&limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.753517 kubelet[2168]: W0412 20:36:53.753409 2168 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.91.217:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.753517 kubelet[2168]: E0412 20:36:53.753477 2168 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.91.217:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.753586 kubelet[2168]: W0412 20:36:53.753581 2168 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 20:36:53.753896 kubelet[2168]: I0412 20:36:53.753866 2168 server.go:1232] "Started kubelet" Apr 12 20:36:53.754047 kubelet[2168]: I0412 20:36:53.754010 2168 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 20:36:53.754047 kubelet[2168]: I0412 20:36:53.754010 2168 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 20:36:53.754219 kubelet[2168]: E0412 20:36:53.754154 2168 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-413b88e4ca.17c5a2c8234ea359", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-413b88e4ca", UID:"ci-3510.3.3-a-413b88e4ca", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-413b88e4ca"}, FirstTimestamp:time.Date(2024, time.April, 12, 20, 36, 53, 753856857, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 20, 36, 53, 753856857, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-413b88e4ca"}': 'Post "https://139.178.91.217:6443/api/v1/namespaces/default/events": dial tcp 139.178.91.217:6443: connect: connection refused'(may retry after sleeping) Apr 12 20:36:53.754290 kubelet[2168]: I0412 20:36:53.754221 2168 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 20:36:53.754290 kubelet[2168]: E0412 20:36:53.754265 2168 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 20:36:53.754340 kubelet[2168]: E0412 20:36:53.754289 2168 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 20:36:53.754000 audit[2168]: AVC avc: denied { mac_admin } for pid=2168 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.754000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:36:53.754000 audit[2168]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eb4030 a1=c0007e8000 a2=c000eb4000 a3=25 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.754000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:36:53.754000 audit[2168]: AVC avc: denied { mac_admin } for pid=2168 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.754000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:36:53.754000 audit[2168]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a90020 a1=c0007e8048 a2=c000eb40c0 a3=25 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.754000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755307 2168 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755327 2168 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755362 2168 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755381 2168 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 20:36:53.755542 kubelet[2168]: E0412 20:36:53.755391 2168 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-413b88e4ca\" not found" Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755425 2168 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755426 2168 server.go:462] "Adding debug handlers to kubelet server" Apr 12 20:36:53.755542 kubelet[2168]: I0412 20:36:53.755444 2168 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 20:36:53.755693 kubelet[2168]: E0412 20:36:53.755558 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.91.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-413b88e4ca?timeout=10s\": dial tcp 139.178.91.217:6443: connect: connection refused" interval="200ms" Apr 12 20:36:53.755693 kubelet[2168]: W0412 20:36:53.755586 2168 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.91.217:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.755693 kubelet[2168]: E0412 20:36:53.755626 2168 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.91.217:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.756000 audit[2192]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.756000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc072f00c0 a2=0 a3=7ffc072f00ac items=0 ppid=2168 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 20:36:53.756000 audit[2193]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.756000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff03dafb40 a2=0 a3=7fff03dafb2c items=0 ppid=2168 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 20:36:53.757000 audit[2195]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.757000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2954ce10 a2=0 a3=7ffe2954cdfc items=0 ppid=2168 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:36:53.758000 audit[2197]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.758000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc866cf6b0 a2=0 a3=7ffc866cf69c items=0 ppid=2168 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:36:53.762000 audit[2200]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.762000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff6fb730b0 a2=0 a3=7fff6fb7309c items=0 ppid=2168 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 20:36:53.763314 kubelet[2168]: I0412 20:36:53.763248 2168 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 20:36:53.762000 audit[2201]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:36:53.762000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc223b360 a2=0 a3=7ffcc223b34c items=0 ppid=2168 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 20:36:53.763796 kubelet[2168]: I0412 20:36:53.763736 2168 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 20:36:53.763796 kubelet[2168]: I0412 20:36:53.763755 2168 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 20:36:53.763796 kubelet[2168]: I0412 20:36:53.763770 2168 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 20:36:53.763000 audit[2202]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.763000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd89df6200 a2=0 a3=7ffd89df61ec items=0 ppid=2168 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 20:36:53.763974 kubelet[2168]: E0412 20:36:53.763805 2168 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 20:36:53.764024 kubelet[2168]: W0412 20:36:53.764010 2168 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.91.217:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.764061 kubelet[2168]: E0412 20:36:53.764034 2168 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.91.217:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.91.217:6443: connect: connection refused Apr 12 20:36:53.763000 audit[2204]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:36:53.763000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd5908fe0 a2=0 a3=7ffcd5908fcc items=0 ppid=2168 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 20:36:53.763000 audit[2205]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.763000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeee4dc340 a2=0 a3=7ffeee4dc32c items=0 ppid=2168 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 20:36:53.764000 audit[2206]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:36:53.764000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd729f14c0 a2=0 a3=7ffd729f14ac items=0 ppid=2168 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 20:36:53.764000 audit[2207]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:36:53.764000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe97145e60 a2=0 a3=7ffe97145e4c items=0 ppid=2168 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 20:36:53.764000 audit[2208]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:36:53.764000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4341a8e0 a2=0 a3=7ffe4341a8cc items=0 ppid=2168 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 20:36:53.767693 kubelet[2168]: I0412 20:36:53.767658 2168 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 20:36:53.767693 kubelet[2168]: I0412 20:36:53.767666 2168 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 20:36:53.767693 kubelet[2168]: I0412 20:36:53.767673 2168 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:36:53.768574 kubelet[2168]: I0412 20:36:53.768540 2168 policy_none.go:49] "None policy: Start" Apr 12 20:36:53.768728 kubelet[2168]: I0412 20:36:53.768720 2168 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 20:36:53.768751 kubelet[2168]: I0412 20:36:53.768733 2168 state_mem.go:35] "Initializing new in-memory state store" Apr 12 20:36:53.770922 systemd[1]: Created slice kubepods.slice. Apr 12 20:36:53.773274 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 20:36:53.774605 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 20:36:53.795290 kubelet[2168]: I0412 20:36:53.795279 2168 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 20:36:53.794000 audit[2168]: AVC avc: denied { mac_admin } for pid=2168 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:53.794000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:36:53.794000 audit[2168]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00013e4b0 a1=c000fb2348 a2=c00013e450 a3=25 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:53.794000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:36:53.795499 kubelet[2168]: I0412 20:36:53.795310 2168 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 20:36:53.795499 kubelet[2168]: I0412 20:36:53.795421 2168 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 20:36:53.795671 kubelet[2168]: E0412 20:36:53.795663 2168 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-413b88e4ca\" not found" Apr 12 20:36:53.860053 kubelet[2168]: I0412 20:36:53.859970 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.860666 kubelet[2168]: E0412 20:36:53.860592 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.217:6443/api/v1/nodes\": dial tcp 139.178.91.217:6443: connect: connection refused" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.864963 kubelet[2168]: I0412 20:36:53.864872 2168 topology_manager.go:215] "Topology Admit Handler" podUID="f8c37b060b30658dc9f0463072c55758" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.868179 kubelet[2168]: I0412 20:36:53.868107 2168 topology_manager.go:215] "Topology Admit Handler" podUID="91aa6af185d26b934499b9dd13e202ef" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.871996 kubelet[2168]: I0412 20:36:53.871952 2168 topology_manager.go:215] "Topology Admit Handler" podUID="82f900090175db8d8fd64071166bc7f3" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.884370 systemd[1]: Created slice kubepods-burstable-podf8c37b060b30658dc9f0463072c55758.slice. Apr 12 20:36:53.915482 systemd[1]: Created slice kubepods-burstable-pod91aa6af185d26b934499b9dd13e202ef.slice. Apr 12 20:36:53.923120 systemd[1]: Created slice kubepods-burstable-pod82f900090175db8d8fd64071166bc7f3.slice. Apr 12 20:36:53.956761 kubelet[2168]: I0412 20:36:53.956646 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f8c37b060b30658dc9f0463072c55758-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" (UID: \"f8c37b060b30658dc9f0463072c55758\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.956761 kubelet[2168]: E0412 20:36:53.956701 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.91.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-413b88e4ca?timeout=10s\": dial tcp 139.178.91.217:6443: connect: connection refused" interval="400ms" Apr 12 20:36:53.956761 kubelet[2168]: I0412 20:36:53.956764 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f8c37b060b30658dc9f0463072c55758-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" (UID: \"f8c37b060b30658dc9f0463072c55758\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.957245 kubelet[2168]: I0412 20:36:53.956839 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f8c37b060b30658dc9f0463072c55758-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" (UID: \"f8c37b060b30658dc9f0463072c55758\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.957245 kubelet[2168]: I0412 20:36:53.956900 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.957245 kubelet[2168]: I0412 20:36:53.956959 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.957245 kubelet[2168]: I0412 20:36:53.957013 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.957245 kubelet[2168]: I0412 20:36:53.957068 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:53.957673 kubelet[2168]: I0412 20:36:53.957208 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:54.058584 kubelet[2168]: I0412 20:36:54.058375 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/82f900090175db8d8fd64071166bc7f3-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-413b88e4ca\" (UID: \"82f900090175db8d8fd64071166bc7f3\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:54.064600 kubelet[2168]: I0412 20:36:54.064574 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:54.064825 kubelet[2168]: E0412 20:36:54.064791 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.217:6443/api/v1/nodes\": dial tcp 139.178.91.217:6443: connect: connection refused" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:54.209915 env[1475]: time="2024-04-12T20:36:54.209777023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-413b88e4ca,Uid:f8c37b060b30658dc9f0463072c55758,Namespace:kube-system,Attempt:0,}" Apr 12 20:36:54.220871 env[1475]: time="2024-04-12T20:36:54.220756262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-413b88e4ca,Uid:91aa6af185d26b934499b9dd13e202ef,Namespace:kube-system,Attempt:0,}" Apr 12 20:36:54.230196 env[1475]: time="2024-04-12T20:36:54.230120102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-413b88e4ca,Uid:82f900090175db8d8fd64071166bc7f3,Namespace:kube-system,Attempt:0,}" Apr 12 20:36:54.357823 kubelet[2168]: E0412 20:36:54.357603 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.91.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-413b88e4ca?timeout=10s\": dial tcp 139.178.91.217:6443: connect: connection refused" interval="800ms" Apr 12 20:36:54.468780 kubelet[2168]: I0412 20:36:54.468711 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:54.469541 kubelet[2168]: E0412 20:36:54.469340 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.91.217:6443/api/v1/nodes\": dial tcp 139.178.91.217:6443: connect: connection refused" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:54.714492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1604560711.mount: Deactivated successfully. Apr 12 20:36:54.715982 env[1475]: time="2024-04-12T20:36:54.715929422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.716823 env[1475]: time="2024-04-12T20:36:54.716809126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.717387 env[1475]: time="2024-04-12T20:36:54.717373339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.718112 env[1475]: time="2024-04-12T20:36:54.718101129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.718471 env[1475]: time="2024-04-12T20:36:54.718462046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.719281 env[1475]: time="2024-04-12T20:36:54.719268345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.720505 env[1475]: time="2024-04-12T20:36:54.720492008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.720942 env[1475]: time="2024-04-12T20:36:54.720930534Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.723090 env[1475]: time="2024-04-12T20:36:54.723076531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.724285 env[1475]: time="2024-04-12T20:36:54.724272075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.724679 env[1475]: time="2024-04-12T20:36:54.724667165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.725213 env[1475]: time="2024-04-12T20:36:54.725165744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:36:54.730652 env[1475]: time="2024-04-12T20:36:54.730614841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:36:54.730652 env[1475]: time="2024-04-12T20:36:54.730638534Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:36:54.730652 env[1475]: time="2024-04-12T20:36:54.730645592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:36:54.730797 env[1475]: time="2024-04-12T20:36:54.730721911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f67ea7cd6104a1b9822f78e9fb48cde365ac4efb7efff43e25fb6e4c7b9c04c pid=2219 runtime=io.containerd.runc.v2 Apr 12 20:36:54.731827 env[1475]: time="2024-04-12T20:36:54.731801299Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:36:54.731827 env[1475]: time="2024-04-12T20:36:54.731821249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:36:54.731900 env[1475]: time="2024-04-12T20:36:54.731828186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:36:54.731920 env[1475]: time="2024-04-12T20:36:54.731892228Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f43737cb1bec6de0f77be71fa6061d927813cb4c0680cb6f5b2e3dc6184cfd00 pid=2237 runtime=io.containerd.runc.v2 Apr 12 20:36:54.732481 env[1475]: time="2024-04-12T20:36:54.732455928Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:36:54.732481 env[1475]: time="2024-04-12T20:36:54.732471858Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:36:54.732481 env[1475]: time="2024-04-12T20:36:54.732478480Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:36:54.732558 env[1475]: time="2024-04-12T20:36:54.732538859Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22946ce8083c8621a4257e276a233c87d132cb3815633d2744e5cdf7074405ce pid=2247 runtime=io.containerd.runc.v2 Apr 12 20:36:54.736891 systemd[1]: Started cri-containerd-4f67ea7cd6104a1b9822f78e9fb48cde365ac4efb7efff43e25fb6e4c7b9c04c.scope. Apr 12 20:36:54.739062 systemd[1]: Started cri-containerd-22946ce8083c8621a4257e276a233c87d132cb3815633d2744e5cdf7074405ce.scope. Apr 12 20:36:54.739748 systemd[1]: Started cri-containerd-f43737cb1bec6de0f77be71fa6061d927813cb4c0680cb6f5b2e3dc6184cfd00.scope. Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit: BPF prog-id=64 op=LOAD Apr 12 20:36:54.742000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2219 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363765613763643631303461316239383232663738653966623438 Apr 12 20:36:54.742000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.742000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2219 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363765613763643631303461316239383232663738653966623438 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit: BPF prog-id=65 op=LOAD Apr 12 20:36:54.743000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ec710 items=0 ppid=2219 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363765613763643631303461316239383232663738653966623438 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit: BPF prog-id=66 op=LOAD Apr 12 20:36:54.743000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ec758 items=0 ppid=2219 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363765613763643631303461316239383232663738653966623438 Apr 12 20:36:54.743000 audit: BPF prog-id=66 op=UNLOAD Apr 12 20:36:54.743000 audit: BPF prog-id=65 op=UNLOAD Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit: BPF prog-id=67 op=LOAD Apr 12 20:36:54.743000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ecb68 items=0 ppid=2219 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363765613763643631303461316239383232663738653966623438 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit: BPF prog-id=68 op=LOAD Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2237 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333733376362316265633664653066373762653731666136303631 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2237 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333733376362316265633664653066373762653731666136303631 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit: BPF prog-id=69 op=LOAD Apr 12 20:36:54.743000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dac80 items=0 ppid=2237 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333733376362316265633664653066373762653731666136303631 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.743000 audit: BPF prog-id=70 op=LOAD Apr 12 20:36:54.743000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dacc8 items=0 ppid=2237 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333733376362316265633664653066373762653731666136303631 Apr 12 20:36:54.743000 audit: BPF prog-id=70 op=UNLOAD Apr 12 20:36:54.743000 audit: BPF prog-id=69 op=UNLOAD Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit: BPF prog-id=71 op=LOAD Apr 12 20:36:54.744000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001db0d8 items=0 ppid=2237 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333733376362316265633664653066373762653731666136303631 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit: BPF prog-id=72 op=LOAD Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2247 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393436636538303833633836323161343235376532373661323333 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2247 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393436636538303833633836323161343235376532373661323333 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit: BPF prog-id=73 op=LOAD Apr 12 20:36:54.744000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7ad0 items=0 ppid=2247 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393436636538303833633836323161343235376532373661323333 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit: BPF prog-id=74 op=LOAD Apr 12 20:36:54.744000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7b18 items=0 ppid=2247 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393436636538303833633836323161343235376532373661323333 Apr 12 20:36:54.744000 audit: BPF prog-id=74 op=UNLOAD Apr 12 20:36:54.744000 audit: BPF prog-id=73 op=UNLOAD Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.744000 audit: BPF prog-id=75 op=LOAD Apr 12 20:36:54.744000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7f28 items=0 ppid=2247 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232393436636538303833633836323161343235376532373661323333 Apr 12 20:36:54.759912 env[1475]: time="2024-04-12T20:36:54.759889101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-413b88e4ca,Uid:f8c37b060b30658dc9f0463072c55758,Namespace:kube-system,Attempt:0,} returns sandbox id \"4f67ea7cd6104a1b9822f78e9fb48cde365ac4efb7efff43e25fb6e4c7b9c04c\"" Apr 12 20:36:54.761536 env[1475]: time="2024-04-12T20:36:54.761518097Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-413b88e4ca,Uid:91aa6af185d26b934499b9dd13e202ef,Namespace:kube-system,Attempt:0,} returns sandbox id \"22946ce8083c8621a4257e276a233c87d132cb3815633d2744e5cdf7074405ce\"" Apr 12 20:36:54.761536 env[1475]: time="2024-04-12T20:36:54.761525225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-413b88e4ca,Uid:82f900090175db8d8fd64071166bc7f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"f43737cb1bec6de0f77be71fa6061d927813cb4c0680cb6f5b2e3dc6184cfd00\"" Apr 12 20:36:54.761718 env[1475]: time="2024-04-12T20:36:54.761706928Z" level=info msg="CreateContainer within sandbox \"4f67ea7cd6104a1b9822f78e9fb48cde365ac4efb7efff43e25fb6e4c7b9c04c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 20:36:54.762494 env[1475]: time="2024-04-12T20:36:54.762479321Z" level=info msg="CreateContainer within sandbox \"f43737cb1bec6de0f77be71fa6061d927813cb4c0680cb6f5b2e3dc6184cfd00\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 20:36:54.762580 env[1475]: time="2024-04-12T20:36:54.762565467Z" level=info msg="CreateContainer within sandbox \"22946ce8083c8621a4257e276a233c87d132cb3815633d2744e5cdf7074405ce\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 20:36:54.768128 env[1475]: time="2024-04-12T20:36:54.768079648Z" level=info msg="CreateContainer within sandbox \"4f67ea7cd6104a1b9822f78e9fb48cde365ac4efb7efff43e25fb6e4c7b9c04c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ee9232c1006e27437d182d181f421d50f4b9cf12ed362d50a0fd851fc2ea91ab\"" Apr 12 20:36:54.768351 env[1475]: time="2024-04-12T20:36:54.768315249Z" level=info msg="StartContainer for \"ee9232c1006e27437d182d181f421d50f4b9cf12ed362d50a0fd851fc2ea91ab\"" Apr 12 20:36:54.768874 env[1475]: time="2024-04-12T20:36:54.768858408Z" level=info msg="CreateContainer within sandbox \"f43737cb1bec6de0f77be71fa6061d927813cb4c0680cb6f5b2e3dc6184cfd00\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"92ee024dbcc02da104a8516f13db0a725a2d1d8b146df68a3471a0a5555a1ccc\"" Apr 12 20:36:54.769050 env[1475]: time="2024-04-12T20:36:54.768996634Z" level=info msg="StartContainer for \"92ee024dbcc02da104a8516f13db0a725a2d1d8b146df68a3471a0a5555a1ccc\"" Apr 12 20:36:54.769779 env[1475]: time="2024-04-12T20:36:54.769733084Z" level=info msg="CreateContainer within sandbox \"22946ce8083c8621a4257e276a233c87d132cb3815633d2744e5cdf7074405ce\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b2666648ce5cda35732a13c4b74a64547316932a21e1573df6a1a87c8ba6c5e1\"" Apr 12 20:36:54.769883 env[1475]: time="2024-04-12T20:36:54.769869861Z" level=info msg="StartContainer for \"b2666648ce5cda35732a13c4b74a64547316932a21e1573df6a1a87c8ba6c5e1\"" Apr 12 20:36:54.777049 systemd[1]: Started cri-containerd-92ee024dbcc02da104a8516f13db0a725a2d1d8b146df68a3471a0a5555a1ccc.scope. Apr 12 20:36:54.777692 systemd[1]: Started cri-containerd-b2666648ce5cda35732a13c4b74a64547316932a21e1573df6a1a87c8ba6c5e1.scope. Apr 12 20:36:54.778277 systemd[1]: Started cri-containerd-ee9232c1006e27437d182d181f421d50f4b9cf12ed362d50a0fd851fc2ea91ab.scope. Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.782000 audit: BPF prog-id=76 op=LOAD Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2237 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656530323464626363303264613130346138353136663133646230 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2237 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656530323464626363303264613130346138353136663133646230 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=77 op=LOAD Apr 12 20:36:54.783000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300960 items=0 ppid=2237 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656530323464626363303264613130346138353136663133646230 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=78 op=LOAD Apr 12 20:36:54.783000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003009a8 items=0 ppid=2237 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656530323464626363303264613130346138353136663133646230 Apr 12 20:36:54.783000 audit: BPF prog-id=78 op=UNLOAD Apr 12 20:36:54.783000 audit: BPF prog-id=77 op=UNLOAD Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=79 op=LOAD Apr 12 20:36:54.783000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300db8 items=0 ppid=2237 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656530323464626363303264613130346138353136663133646230 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=80 op=LOAD Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2219 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393233326331303036653237343337643138326431383166343231 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2219 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393233326331303036653237343337643138326431383166343231 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=81 op=LOAD Apr 12 20:36:54.783000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009ae90 items=0 ppid=2219 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393233326331303036653237343337643138326431383166343231 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=82 op=LOAD Apr 12 20:36:54.783000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009aed8 items=0 ppid=2219 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393233326331303036653237343337643138326431383166343231 Apr 12 20:36:54.783000 audit: BPF prog-id=82 op=UNLOAD Apr 12 20:36:54.783000 audit: BPF prog-id=81 op=UNLOAD Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.783000 audit: BPF prog-id=83 op=LOAD Apr 12 20:36:54.783000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b2e8 items=0 ppid=2219 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393233326331303036653237343337643138326431383166343231 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit: BPF prog-id=84 op=LOAD Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2247 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232363636363438636535636461333537333261313363346237346136 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2247 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232363636363438636535636461333537333261313363346237346136 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit: BPF prog-id=85 op=LOAD Apr 12 20:36:54.784000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025d00 items=0 ppid=2247 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232363636363438636535636461333537333261313363346237346136 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.784000 audit: BPF prog-id=86 op=LOAD Apr 12 20:36:54.784000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025d48 items=0 ppid=2247 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232363636363438636535636461333537333261313363346237346136 Apr 12 20:36:54.784000 audit: BPF prog-id=86 op=UNLOAD Apr 12 20:36:54.784000 audit: BPF prog-id=85 op=UNLOAD Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:54.785000 audit: BPF prog-id=87 op=LOAD Apr 12 20:36:54.785000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e8158 items=0 ppid=2247 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:54.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232363636363438636535636461333537333261313363346237346136 Apr 12 20:36:54.801271 env[1475]: time="2024-04-12T20:36:54.801236395Z" level=info msg="StartContainer for \"92ee024dbcc02da104a8516f13db0a725a2d1d8b146df68a3471a0a5555a1ccc\" returns successfully" Apr 12 20:36:54.801601 env[1475]: time="2024-04-12T20:36:54.801582889Z" level=info msg="StartContainer for \"ee9232c1006e27437d182d181f421d50f4b9cf12ed362d50a0fd851fc2ea91ab\" returns successfully" Apr 12 20:36:54.802139 env[1475]: time="2024-04-12T20:36:54.802124212Z" level=info msg="StartContainer for \"b2666648ce5cda35732a13c4b74a64547316932a21e1573df6a1a87c8ba6c5e1\" returns successfully" Apr 12 20:36:55.271121 kubelet[2168]: I0412 20:36:55.271082 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:55.290000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.290000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a37ec0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:36:55.290000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:36:55.290000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.290000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005964c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:36:55.290000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:36:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0084c9dd0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:36:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:36:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007587540 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:36:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:36:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c002c91020 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:36:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:36:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0060f86f0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:36:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:36:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0023738e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:36:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:36:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:36:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0071b6240 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:36:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:36:55.609894 kubelet[2168]: E0412 20:36:55.609871 2168 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.3-a-413b88e4ca\" not found" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:55.709947 kubelet[2168]: I0412 20:36:55.709892 2168 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:55.753641 kubelet[2168]: I0412 20:36:55.753592 2168 apiserver.go:52] "Watching apiserver" Apr 12 20:36:55.779711 kubelet[2168]: E0412 20:36:55.779665 2168 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:55.779711 kubelet[2168]: E0412 20:36:55.779678 2168 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-413b88e4ca\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:55.779997 kubelet[2168]: E0412 20:36:55.779676 2168 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:55.856525 kubelet[2168]: I0412 20:36:55.856289 2168 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 20:36:56.863029 kubelet[2168]: W0412 20:36:56.862924 2168 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:36:56.863857 kubelet[2168]: W0412 20:36:56.863136 2168 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:36:56.863857 kubelet[2168]: W0412 20:36:56.863315 2168 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:36:58.708000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 20:36:58.752064 kernel: kauditd_printk_skb: 579 callbacks suppressed Apr 12 20:36:58.752181 kernel: audit: type=1400 audit(1712954218.708:693): avc: denied { watch } for pid=2386 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 20:36:58.708000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f97100 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:36:58.966211 kernel: audit: type=1300 audit(1712954218.708:693): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f97100 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:36:58.966270 kernel: audit: type=1327 audit(1712954218.708:693): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:36:58.708000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:36:59.011559 systemd[1]: Reloading. Apr 12 20:36:59.043768 /usr/lib/systemd/system-generators/torcx-generator[2499]: time="2024-04-12T20:36:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:36:59.043784 /usr/lib/systemd/system-generators/torcx-generator[2499]: time="2024-04-12T20:36:59Z" level=info msg="torcx already run" Apr 12 20:36:59.096021 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:36:59.096029 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:36:59.108404 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.286272 kernel: audit: type=1400 audit(1712954219.158:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.286343 kernel: audit: type=1400 audit(1712954219.158:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.286376 kernel: audit: type=1400 audit(1712954219.158:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.350112 kernel: audit: type=1400 audit(1712954219.158:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.415231 kernel: audit: type=1400 audit(1712954219.158:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.480276 kernel: audit: type=1400 audit(1712954219.158:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.545388 kernel: audit: type=1400 audit(1712954219.158:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit: BPF prog-id=88 op=LOAD Apr 12 20:36:59.349000 audit: BPF prog-id=49 op=UNLOAD Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit: BPF prog-id=89 op=LOAD Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit: BPF prog-id=90 op=LOAD Apr 12 20:36:59.609000 audit: BPF prog-id=50 op=UNLOAD Apr 12 20:36:59.609000 audit: BPF prog-id=51 op=UNLOAD Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit: BPF prog-id=91 op=LOAD Apr 12 20:36:59.609000 audit: BPF prog-id=52 op=UNLOAD Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.609000 audit: BPF prog-id=92 op=LOAD Apr 12 20:36:59.609000 audit: BPF prog-id=72 op=UNLOAD Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit: BPF prog-id=93 op=LOAD Apr 12 20:36:59.610000 audit: BPF prog-id=80 op=UNLOAD Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.610000 audit: BPF prog-id=94 op=LOAD Apr 12 20:36:59.610000 audit: BPF prog-id=84 op=UNLOAD Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit: BPF prog-id=95 op=LOAD Apr 12 20:36:59.611000 audit: BPF prog-id=53 op=UNLOAD Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.611000 audit: BPF prog-id=96 op=LOAD Apr 12 20:36:59.611000 audit: BPF prog-id=64 op=UNLOAD Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit: BPF prog-id=97 op=LOAD Apr 12 20:36:59.613000 audit: BPF prog-id=68 op=UNLOAD Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit: BPF prog-id=98 op=LOAD Apr 12 20:36:59.613000 audit: BPF prog-id=54 op=UNLOAD Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit: BPF prog-id=99 op=LOAD Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit: BPF prog-id=100 op=LOAD Apr 12 20:36:59.613000 audit: BPF prog-id=55 op=UNLOAD Apr 12 20:36:59.613000 audit: BPF prog-id=56 op=UNLOAD Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit: BPF prog-id=101 op=LOAD Apr 12 20:36:59.614000 audit: BPF prog-id=57 op=UNLOAD Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit: BPF prog-id=102 op=LOAD Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit: BPF prog-id=103 op=LOAD Apr 12 20:36:59.614000 audit: BPF prog-id=58 op=UNLOAD Apr 12 20:36:59.614000 audit: BPF prog-id=59 op=UNLOAD Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.614000 audit: BPF prog-id=104 op=LOAD Apr 12 20:36:59.614000 audit: BPF prog-id=60 op=UNLOAD Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit: BPF prog-id=105 op=LOAD Apr 12 20:36:59.616000 audit: BPF prog-id=76 op=UNLOAD Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit: BPF prog-id=106 op=LOAD Apr 12 20:36:59.616000 audit: BPF prog-id=61 op=UNLOAD Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit: BPF prog-id=107 op=LOAD Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.616000 audit: BPF prog-id=108 op=LOAD Apr 12 20:36:59.616000 audit: BPF prog-id=62 op=UNLOAD Apr 12 20:36:59.616000 audit: BPF prog-id=63 op=UNLOAD Apr 12 20:36:59.623015 kubelet[2168]: I0412 20:36:59.622976 2168 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 20:36:59.623010 systemd[1]: Stopping kubelet.service... Apr 12 20:36:59.648114 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 20:36:59.648224 systemd[1]: Stopped kubelet.service. Apr 12 20:36:59.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:59.649157 systemd[1]: Started kubelet.service. Apr 12 20:36:59.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:36:59.671660 kubelet[2559]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:36:59.671660 kubelet[2559]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 20:36:59.671660 kubelet[2559]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:36:59.671900 kubelet[2559]: I0412 20:36:59.671684 2559 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 20:36:59.674135 kubelet[2559]: I0412 20:36:59.674100 2559 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 20:36:59.674135 kubelet[2559]: I0412 20:36:59.674115 2559 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 20:36:59.674288 kubelet[2559]: I0412 20:36:59.674244 2559 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 20:36:59.675605 kubelet[2559]: I0412 20:36:59.675567 2559 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 20:36:59.676196 kubelet[2559]: I0412 20:36:59.676184 2559 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 20:36:59.695695 kubelet[2559]: I0412 20:36:59.695647 2559 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 20:36:59.695833 kubelet[2559]: I0412 20:36:59.695795 2559 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 20:36:59.696030 kubelet[2559]: I0412 20:36:59.695893 2559 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 20:36:59.696030 kubelet[2559]: I0412 20:36:59.696009 2559 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 20:36:59.696030 kubelet[2559]: I0412 20:36:59.696015 2559 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 20:36:59.696143 kubelet[2559]: I0412 20:36:59.696035 2559 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:36:59.696143 kubelet[2559]: I0412 20:36:59.696081 2559 kubelet.go:393] "Attempting to sync node with API server" Apr 12 20:36:59.696143 kubelet[2559]: I0412 20:36:59.696092 2559 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 20:36:59.696143 kubelet[2559]: I0412 20:36:59.696107 2559 kubelet.go:309] "Adding apiserver pod source" Apr 12 20:36:59.696143 kubelet[2559]: I0412 20:36:59.696116 2559 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 20:36:59.696602 kubelet[2559]: I0412 20:36:59.696589 2559 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 20:36:59.696892 kubelet[2559]: I0412 20:36:59.696883 2559 server.go:1232] "Started kubelet" Apr 12 20:36:59.696964 kubelet[2559]: I0412 20:36:59.696954 2559 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 20:36:59.696998 kubelet[2559]: I0412 20:36:59.696954 2559 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 20:36:59.697113 kubelet[2559]: I0412 20:36:59.697098 2559 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 20:36:59.697181 kubelet[2559]: E0412 20:36:59.697171 2559 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 20:36:59.697336 kubelet[2559]: E0412 20:36:59.697319 2559 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 20:36:59.698345 kubelet[2559]: I0412 20:36:59.698336 2559 server.go:462] "Adding debug handlers to kubelet server" Apr 12 20:36:59.697000 audit[2559]: AVC avc: denied { mac_admin } for pid=2559 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.697000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:36:59.697000 audit[2559]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000534420 a1=c00014c948 a2=c0005343f0 a3=25 items=0 ppid=1 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:59.697000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:36:59.697000 audit[2559]: AVC avc: denied { mac_admin } for pid=2559 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.697000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:36:59.697000 audit[2559]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000afda0 a1=c00014c960 a2=c0005344b0 a3=25 items=0 ppid=1 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:59.697000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:36:59.698698 kubelet[2559]: I0412 20:36:59.698398 2559 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 20:36:59.698698 kubelet[2559]: I0412 20:36:59.698421 2559 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 20:36:59.698698 kubelet[2559]: I0412 20:36:59.698437 2559 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 20:36:59.698698 kubelet[2559]: I0412 20:36:59.698460 2559 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 20:36:59.698698 kubelet[2559]: E0412 20:36:59.698484 2559 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-413b88e4ca\" not found" Apr 12 20:36:59.698698 kubelet[2559]: I0412 20:36:59.698522 2559 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 20:36:59.698698 kubelet[2559]: I0412 20:36:59.698613 2559 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 20:36:59.703646 kubelet[2559]: I0412 20:36:59.703618 2559 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 20:36:59.704377 kubelet[2559]: I0412 20:36:59.704358 2559 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 20:36:59.704492 kubelet[2559]: I0412 20:36:59.704479 2559 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 20:36:59.704611 kubelet[2559]: I0412 20:36:59.704601 2559 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 20:36:59.704716 kubelet[2559]: E0412 20:36:59.704706 2559 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 20:36:59.718842 kubelet[2559]: I0412 20:36:59.718826 2559 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 20:36:59.718842 kubelet[2559]: I0412 20:36:59.718838 2559 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 20:36:59.718842 kubelet[2559]: I0412 20:36:59.718847 2559 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:36:59.719002 kubelet[2559]: I0412 20:36:59.718936 2559 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 20:36:59.719002 kubelet[2559]: I0412 20:36:59.718949 2559 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 20:36:59.719002 kubelet[2559]: I0412 20:36:59.718953 2559 policy_none.go:49] "None policy: Start" Apr 12 20:36:59.719275 kubelet[2559]: I0412 20:36:59.719267 2559 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 20:36:59.719304 kubelet[2559]: I0412 20:36:59.719282 2559 state_mem.go:35] "Initializing new in-memory state store" Apr 12 20:36:59.719388 kubelet[2559]: I0412 20:36:59.719382 2559 state_mem.go:75] "Updated machine memory state" Apr 12 20:36:59.721559 kubelet[2559]: I0412 20:36:59.721549 2559 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 20:36:59.720000 audit[2559]: AVC avc: denied { mac_admin } for pid=2559 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:36:59.720000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:36:59.720000 audit[2559]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009676b0 a1=c000ab78c0 a2=c000967680 a3=25 items=0 ppid=1 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:36:59.720000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:36:59.721784 kubelet[2559]: I0412 20:36:59.721578 2559 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 20:36:59.721784 kubelet[2559]: I0412 20:36:59.721693 2559 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 20:36:59.801073 kubelet[2559]: I0412 20:36:59.800974 2559 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.805619 kubelet[2559]: I0412 20:36:59.805604 2559 topology_manager.go:215] "Topology Admit Handler" podUID="f8c37b060b30658dc9f0463072c55758" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.805685 kubelet[2559]: I0412 20:36:59.805668 2559 topology_manager.go:215] "Topology Admit Handler" podUID="91aa6af185d26b934499b9dd13e202ef" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.805711 kubelet[2559]: I0412 20:36:59.805692 2559 topology_manager.go:215] "Topology Admit Handler" podUID="82f900090175db8d8fd64071166bc7f3" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.805869 kubelet[2559]: I0412 20:36:59.805859 2559 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.805908 kubelet[2559]: I0412 20:36:59.805902 2559 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.809829 kubelet[2559]: W0412 20:36:59.809815 2559 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:36:59.809829 kubelet[2559]: W0412 20:36:59.809830 2559 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:36:59.809917 kubelet[2559]: W0412 20:36:59.809842 2559 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:36:59.809917 kubelet[2559]: E0412 20:36:59.809852 2559 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-413b88e4ca\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.809917 kubelet[2559]: E0412 20:36:59.809859 2559 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.809917 kubelet[2559]: E0412 20:36:59.809880 2559 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.899968 kubelet[2559]: I0412 20:36:59.899949 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.899968 kubelet[2559]: I0412 20:36:59.899976 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/82f900090175db8d8fd64071166bc7f3-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-413b88e4ca\" (UID: \"82f900090175db8d8fd64071166bc7f3\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900071 kubelet[2559]: I0412 20:36:59.899989 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f8c37b060b30658dc9f0463072c55758-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" (UID: \"f8c37b060b30658dc9f0463072c55758\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900071 kubelet[2559]: I0412 20:36:59.900001 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f8c37b060b30658dc9f0463072c55758-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" (UID: \"f8c37b060b30658dc9f0463072c55758\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900071 kubelet[2559]: I0412 20:36:59.900019 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900071 kubelet[2559]: I0412 20:36:59.900031 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900071 kubelet[2559]: I0412 20:36:59.900043 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900171 kubelet[2559]: I0412 20:36:59.900055 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f8c37b060b30658dc9f0463072c55758-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" (UID: \"f8c37b060b30658dc9f0463072c55758\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:36:59.900171 kubelet[2559]: I0412 20:36:59.900097 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/91aa6af185d26b934499b9dd13e202ef-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-413b88e4ca\" (UID: \"91aa6af185d26b934499b9dd13e202ef\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:00.309000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:00.309000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1c960 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:00.309000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:00.311000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:00.311000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1c9a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:00.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:00.311000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:00.311000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1c9e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:00.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:00.312000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:00.312000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cff420 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:00.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:00.697337 kubelet[2559]: I0412 20:37:00.697285 2559 apiserver.go:52] "Watching apiserver" Apr 12 20:37:00.698858 kubelet[2559]: I0412 20:37:00.698848 2559 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 20:37:00.715721 kubelet[2559]: W0412 20:37:00.715702 2559 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:37:00.715821 kubelet[2559]: E0412 20:37:00.715762 2559 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-413b88e4ca\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:00.723531 kubelet[2559]: I0412 20:37:00.723464 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-413b88e4ca" podStartSLOduration=4.723427893 podCreationTimestamp="2024-04-12 20:36:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:37:00.723397842 +0000 UTC m=+1.072263551" watchObservedRunningTime="2024-04-12 20:37:00.723427893 +0000 UTC m=+1.072293593" Apr 12 20:37:00.741645 kubelet[2559]: I0412 20:37:00.741629 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-413b88e4ca" podStartSLOduration=4.7416079700000004 podCreationTimestamp="2024-04-12 20:36:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:37:00.7415582 +0000 UTC m=+1.090423904" watchObservedRunningTime="2024-04-12 20:37:00.74160797 +0000 UTC m=+1.090473669" Apr 12 20:37:00.746020 kubelet[2559]: I0412 20:37:00.746009 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-413b88e4ca" podStartSLOduration=4.74599036 podCreationTimestamp="2024-04-12 20:36:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:37:00.745853122 +0000 UTC m=+1.094718824" watchObservedRunningTime="2024-04-12 20:37:00.74599036 +0000 UTC m=+1.094856060" Apr 12 20:37:03.723545 sudo[1631]: pam_unix(sudo:session): session closed for user root Apr 12 20:37:03.722000 audit[1631]: USER_END pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:37:03.750570 kernel: kauditd_printk_skb: 263 callbacks suppressed Apr 12 20:37:03.750613 kernel: audit: type=1106 audit(1712954223.722:947): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:37:03.750913 sshd[1628]: pam_unix(sshd:session): session closed for user core Apr 12 20:37:03.752860 systemd[1]: sshd@6-139.178.91.217:22-147.75.109.163:54110.service: Deactivated successfully. Apr 12 20:37:03.753446 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 20:37:03.753589 systemd[1]: session-9.scope: Consumed 2.962s CPU time. Apr 12 20:37:03.753987 systemd-logind[1463]: Session 9 logged out. Waiting for processes to exit. Apr 12 20:37:03.754656 systemd-logind[1463]: Removed session 9. Apr 12 20:37:03.722000 audit[1631]: CRED_DISP pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:37:03.927929 kernel: audit: type=1104 audit(1712954223.722:948): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:37:03.927961 kernel: audit: type=1106 audit(1712954223.751:949): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:37:03.751000 audit[1628]: USER_END pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:37:04.023930 kernel: audit: type=1104 audit(1712954223.751:950): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:37:03.751000 audit[1628]: CRED_DISP pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:37:03.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.217:22-147.75.109.163:54110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:04.114816 kernel: audit: type=1131 audit(1712954223.752:951): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.91.217:22-147.75.109.163:54110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:37:11.222533 kubelet[2559]: I0412 20:37:11.222424 2559 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 20:37:11.223652 env[1475]: time="2024-04-12T20:37:11.223373386Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 20:37:11.224287 kubelet[2559]: I0412 20:37:11.223797 2559 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 20:37:12.136348 kubelet[2559]: I0412 20:37:12.136280 2559 topology_manager.go:215] "Topology Admit Handler" podUID="d6831db4-0819-423e-bebd-dafafaf944e8" podNamespace="kube-system" podName="kube-proxy-z7tfw" Apr 12 20:37:12.153520 systemd[1]: Created slice kubepods-besteffort-podd6831db4_0819_423e_bebd_dafafaf944e8.slice. Apr 12 20:37:12.192267 kubelet[2559]: I0412 20:37:12.192211 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d6831db4-0819-423e-bebd-dafafaf944e8-kube-proxy\") pod \"kube-proxy-z7tfw\" (UID: \"d6831db4-0819-423e-bebd-dafafaf944e8\") " pod="kube-system/kube-proxy-z7tfw" Apr 12 20:37:12.192536 kubelet[2559]: I0412 20:37:12.192353 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6831db4-0819-423e-bebd-dafafaf944e8-xtables-lock\") pod \"kube-proxy-z7tfw\" (UID: \"d6831db4-0819-423e-bebd-dafafaf944e8\") " pod="kube-system/kube-proxy-z7tfw" Apr 12 20:37:12.192536 kubelet[2559]: I0412 20:37:12.192450 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6831db4-0819-423e-bebd-dafafaf944e8-lib-modules\") pod \"kube-proxy-z7tfw\" (UID: \"d6831db4-0819-423e-bebd-dafafaf944e8\") " pod="kube-system/kube-proxy-z7tfw" Apr 12 20:37:12.192801 kubelet[2559]: I0412 20:37:12.192561 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gpddn\" (UniqueName: \"kubernetes.io/projected/d6831db4-0819-423e-bebd-dafafaf944e8-kube-api-access-gpddn\") pod \"kube-proxy-z7tfw\" (UID: \"d6831db4-0819-423e-bebd-dafafaf944e8\") " pod="kube-system/kube-proxy-z7tfw" Apr 12 20:37:12.267272 kubelet[2559]: I0412 20:37:12.267162 2559 topology_manager.go:215] "Topology Admit Handler" podUID="3c60de51-e45b-4243-af4e-9efd6d4570da" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-p999q" Apr 12 20:37:12.280368 systemd[1]: Created slice kubepods-besteffort-pod3c60de51_e45b_4243_af4e_9efd6d4570da.slice. Apr 12 20:37:12.293114 kubelet[2559]: I0412 20:37:12.293053 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3c60de51-e45b-4243-af4e-9efd6d4570da-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-p999q\" (UID: \"3c60de51-e45b-4243-af4e-9efd6d4570da\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-p999q" Apr 12 20:37:12.293361 kubelet[2559]: I0412 20:37:12.293167 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgt5q\" (UniqueName: \"kubernetes.io/projected/3c60de51-e45b-4243-af4e-9efd6d4570da-kube-api-access-rgt5q\") pod \"tigera-operator-6bfc79cb9c-p999q\" (UID: \"3c60de51-e45b-4243-af4e-9efd6d4570da\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-p999q" Apr 12 20:37:12.480547 env[1475]: time="2024-04-12T20:37:12.480415526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z7tfw,Uid:d6831db4-0819-423e-bebd-dafafaf944e8,Namespace:kube-system,Attempt:0,}" Apr 12 20:37:12.504255 env[1475]: time="2024-04-12T20:37:12.504035626Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:12.504255 env[1475]: time="2024-04-12T20:37:12.504131786Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:12.504255 env[1475]: time="2024-04-12T20:37:12.504171016Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:12.504743 env[1475]: time="2024-04-12T20:37:12.504559002Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7dc2a4ba3e5417224b3bf0b719842ab582ec566c6e59a29302aba3b67ff0988c pid=2731 runtime=io.containerd.runc.v2 Apr 12 20:37:12.528310 update_engine[1465]: I0412 20:37:12.528206 1465 update_attempter.cc:509] Updating boot flags... Apr 12 20:37:12.535777 systemd[1]: Started cri-containerd-7dc2a4ba3e5417224b3bf0b719842ab582ec566c6e59a29302aba3b67ff0988c.scope. Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.586052 env[1475]: time="2024-04-12T20:37:12.585987857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-p999q,Uid:3c60de51-e45b-4243-af4e-9efd6d4570da,Namespace:tigera-operator,Attempt:0,}" Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.624624 env[1475]: time="2024-04-12T20:37:12.624589164Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:12.624624 env[1475]: time="2024-04-12T20:37:12.624612071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:12.624624 env[1475]: time="2024-04-12T20:37:12.624619264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:12.624781 env[1475]: time="2024-04-12T20:37:12.624680536Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/542951df90ad1731d078c4c2f6cfad5072fa374af92b44c94425e59ac1d5c03e pid=2782 runtime=io.containerd.runc.v2 Apr 12 20:37:12.677126 kernel: audit: type=1400 audit(1712954232.548:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.677187 kernel: audit: type=1400 audit(1712954232.548:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.677205 kernel: audit: type=1400 audit(1712954232.548:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740671 kernel: audit: type=1400 audit(1712954232.548:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.757515 systemd[1]: Started cri-containerd-542951df90ad1731d078c4c2f6cfad5072fa374af92b44c94425e59ac1d5c03e.scope. Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868985 kernel: audit: type=1400 audit(1712954232.548:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.869032 kernel: audit: type=1400 audit(1712954232.548:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.997367 kernel: audit: type=1400 audit(1712954232.548:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.997407 kernel: audit: type=1400 audit(1712954232.548:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.125540 kernel: audit: type=1400 audit(1712954232.548:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.125570 kernel: audit: type=1400 audit(1712954232.739:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.739000 audit: BPF prog-id=109 op=LOAD Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2731 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633261346261336535343137323234623362663062373139383432 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2731 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633261346261336535343137323234623362663062373139383432 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.740000 audit: BPF prog-id=110 op=LOAD Apr 12 20:37:12.740000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210f90 items=0 ppid=2731 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633261346261336535343137323234623362663062373139383432 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit: BPF prog-id=111 op=LOAD Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323935316466393061643137333164303738633463326636636661 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323935316466393061643137333164303738633463326636636661 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:12.868000 audit: BPF prog-id=113 op=LOAD Apr 12 20:37:12.868000 audit: BPF prog-id=112 op=LOAD Apr 12 20:37:12.868000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b7d30 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.868000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c8d38 items=0 ppid=2731 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:12.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633261346261336535343137323234623362663062373139383432 Apr 12 20:37:12.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323935316466393061643137333164303738633463326636636661 Apr 12 20:37:13.187000 audit: BPF prog-id=112 op=UNLOAD Apr 12 20:37:13.187000 audit: BPF prog-id=110 op=UNLOAD Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit: BPF prog-id=114 op=LOAD Apr 12 20:37:13.187000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b7d78 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323935316466393061643137333164303738633463326636636661 Apr 12 20:37:13.187000 audit: BPF prog-id=114 op=UNLOAD Apr 12 20:37:13.187000 audit: BPF prog-id=113 op=UNLOAD Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { perfmon } for pid=2792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit: BPF prog-id=115 op=LOAD Apr 12 20:37:13.187000 audit[2742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c9148 items=0 ppid=2731 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633261346261336535343137323234623362663062373139383432 Apr 12 20:37:13.187000 audit[2792]: AVC avc: denied { bpf } for pid=2792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.187000 audit: BPF prog-id=116 op=LOAD Apr 12 20:37:13.187000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d0188 items=0 ppid=2782 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323935316466393061643137333164303738633463326636636661 Apr 12 20:37:13.194222 env[1475]: time="2024-04-12T20:37:13.194196837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z7tfw,Uid:d6831db4-0819-423e-bebd-dafafaf944e8,Namespace:kube-system,Attempt:0,} returns sandbox id \"7dc2a4ba3e5417224b3bf0b719842ab582ec566c6e59a29302aba3b67ff0988c\"" Apr 12 20:37:13.195405 env[1475]: time="2024-04-12T20:37:13.195386131Z" level=info msg="CreateContainer within sandbox \"7dc2a4ba3e5417224b3bf0b719842ab582ec566c6e59a29302aba3b67ff0988c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 20:37:13.200834 env[1475]: time="2024-04-12T20:37:13.200780179Z" level=info msg="CreateContainer within sandbox \"7dc2a4ba3e5417224b3bf0b719842ab582ec566c6e59a29302aba3b67ff0988c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5eb44b4aacaf4d878bb5251ea7543c8c8c66eae598f51556f641e4ae0acb0880\"" Apr 12 20:37:13.201107 env[1475]: time="2024-04-12T20:37:13.201046666Z" level=info msg="StartContainer for \"5eb44b4aacaf4d878bb5251ea7543c8c8c66eae598f51556f641e4ae0acb0880\"" Apr 12 20:37:13.205937 env[1475]: time="2024-04-12T20:37:13.205906990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-p999q,Uid:3c60de51-e45b-4243-af4e-9efd6d4570da,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"542951df90ad1731d078c4c2f6cfad5072fa374af92b44c94425e59ac1d5c03e\"" Apr 12 20:37:13.206638 env[1475]: time="2024-04-12T20:37:13.206625990Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 20:37:13.209645 systemd[1]: Started cri-containerd-5eb44b4aacaf4d878bb5251ea7543c8c8c66eae598f51556f641e4ae0acb0880.scope. Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00023d6b0 a2=3c a3=7f7d44a5fee8 items=0 ppid=2731 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623434623461616361663464383738626235323531656137353433 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit: BPF prog-id=117 op=LOAD Apr 12 20:37:13.216000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00023d9d8 a2=78 a3=c0003d42a8 items=0 ppid=2731 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623434623461616361663464383738626235323531656137353433 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit: BPF prog-id=118 op=LOAD Apr 12 20:37:13.216000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00023d770 a2=78 a3=c0003d42f8 items=0 ppid=2731 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623434623461616361663464383738626235323531656137353433 Apr 12 20:37:13.216000 audit: BPF prog-id=118 op=UNLOAD Apr 12 20:37:13.216000 audit: BPF prog-id=117 op=UNLOAD Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:13.216000 audit: BPF prog-id=119 op=LOAD Apr 12 20:37:13.216000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00023dc30 a2=78 a3=c0003d4388 items=0 ppid=2731 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623434623461616361663464383738626235323531656137353433 Apr 12 20:37:13.223493 env[1475]: time="2024-04-12T20:37:13.223470835Z" level=info msg="StartContainer for \"5eb44b4aacaf4d878bb5251ea7543c8c8c66eae598f51556f641e4ae0acb0880\" returns successfully" Apr 12 20:37:13.302000 audit[2893]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.302000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8fa8ac90 a2=0 a3=7ffe8fa8ac7c items=0 ppid=2840 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 20:37:13.302000 audit[2892]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.302000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeab233300 a2=0 a3=273994e04238d33f items=0 ppid=2840 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 20:37:13.305000 audit[2895]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.305000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd67fac710 a2=0 a3=7ffd67fac6fc items=0 ppid=2840 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 20:37:13.306000 audit[2894]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.306000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc272ab240 a2=0 a3=7ffc272ab22c items=0 ppid=2840 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 20:37:13.308000 audit[2896]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.308000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcacea10e0 a2=0 a3=7ffcacea10cc items=0 ppid=2840 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 20:37:13.308000 audit[2897]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.308000 audit[2897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd571c00a0 a2=0 a3=7ffd571c008c items=0 ppid=2840 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 20:37:13.407000 audit[2898]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.407000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd4c4efe00 a2=0 a3=7ffd4c4efdec items=0 ppid=2840 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 20:37:13.414000 audit[2900]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.414000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc664c05c0 a2=0 a3=7ffc664c05ac items=0 ppid=2840 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 20:37:13.424000 audit[2903]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.424000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd9672a4e0 a2=0 a3=7ffd9672a4cc items=0 ppid=2840 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 20:37:13.427000 audit[2904]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.427000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5e62d520 a2=0 a3=7fff5e62d50c items=0 ppid=2840 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 20:37:13.433000 audit[2906]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.433000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbbd52550 a2=0 a3=7ffcbbd5253c items=0 ppid=2840 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 20:37:13.436000 audit[2907]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.436000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc53f9420 a2=0 a3=7fffc53f940c items=0 ppid=2840 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 20:37:13.443000 audit[2909]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.443000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd733e05d0 a2=0 a3=7ffd733e05bc items=0 ppid=2840 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 20:37:13.451000 audit[2912]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.451000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd00b59ae0 a2=0 a3=7ffd00b59acc items=0 ppid=2840 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 20:37:13.454000 audit[2913]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.454000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaa6f1390 a2=0 a3=7ffeaa6f137c items=0 ppid=2840 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 20:37:13.460000 audit[2915]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.460000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdece34460 a2=0 a3=7ffdece3444c items=0 ppid=2840 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 20:37:13.463000 audit[2916]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.463000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd04dae9e0 a2=0 a3=7ffd04dae9cc items=0 ppid=2840 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 20:37:13.469000 audit[2918]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.469000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe29834fe0 a2=0 a3=7ffe29834fcc items=0 ppid=2840 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:37:13.478000 audit[2921]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.478000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2d3e3db0 a2=0 a3=7ffc2d3e3d9c items=0 ppid=2840 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:37:13.487000 audit[2924]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.487000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9c730bd0 a2=0 a3=7ffe9c730bbc items=0 ppid=2840 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 20:37:13.490000 audit[2925]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.490000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8e627f70 a2=0 a3=7fff8e627f5c items=0 ppid=2840 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 20:37:13.496000 audit[2927]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.496000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe750dd120 a2=0 a3=7ffe750dd10c items=0 ppid=2840 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:37:13.505000 audit[2930]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.505000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2bc481f0 a2=0 a3=7ffc2bc481dc items=0 ppid=2840 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:37:13.507000 audit[2931]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.507000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd28a665e0 a2=0 a3=7ffd28a665cc items=0 ppid=2840 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 20:37:13.513000 audit[2933]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:37:13.513000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd46c7d480 a2=0 a3=7ffd46c7d46c items=0 ppid=2840 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 20:37:13.566000 audit[2939]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:13.566000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffb6f3da90 a2=0 a3=7fffb6f3da7c items=0 ppid=2840 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:13.575000 audit[2939]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:13.575000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffb6f3da90 a2=0 a3=7fffb6f3da7c items=0 ppid=2840 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:13.577000 audit[2943]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.577000 audit[2943]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe75b70460 a2=0 a3=7ffe75b7044c items=0 ppid=2840 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 20:37:13.580000 audit[2945]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.580000 audit[2945]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdcd119830 a2=0 a3=7ffdcd11981c items=0 ppid=2840 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 20:37:13.586000 audit[2948]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.586000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff23d9b1f0 a2=0 a3=7fff23d9b1dc items=0 ppid=2840 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 20:37:13.587000 audit[2949]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.587000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5cd7bda0 a2=0 a3=7ffc5cd7bd8c items=0 ppid=2840 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 20:37:13.590000 audit[2951]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.590000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5de48330 a2=0 a3=7fff5de4831c items=0 ppid=2840 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 20:37:13.592000 audit[2952]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.592000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07894430 a2=0 a3=7ffe0789441c items=0 ppid=2840 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 20:37:13.595000 audit[2954]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.595000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcef4974a0 a2=0 a3=7ffcef49748c items=0 ppid=2840 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 20:37:13.600000 audit[2957]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.600000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd345d1b80 a2=0 a3=7ffd345d1b6c items=0 ppid=2840 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 20:37:13.603000 audit[2958]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.603000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff62466310 a2=0 a3=7fff624662fc items=0 ppid=2840 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 20:37:13.608000 audit[2960]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.608000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa078d510 a2=0 a3=7fffa078d4fc items=0 ppid=2840 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 20:37:13.610000 audit[2961]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.610000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb6915bb0 a2=0 a3=7ffcb6915b9c items=0 ppid=2840 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 20:37:13.615000 audit[2963]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.615000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc196435d0 a2=0 a3=7ffc196435bc items=0 ppid=2840 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:37:13.623000 audit[2966]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.623000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe26165ea0 a2=0 a3=7ffe26165e8c items=0 ppid=2840 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 20:37:13.630000 audit[2969]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.630000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe17963790 a2=0 a3=7ffe1796377c items=0 ppid=2840 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 20:37:13.632000 audit[2970]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.632000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd607e01c0 a2=0 a3=7ffd607e01ac items=0 ppid=2840 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 20:37:13.637000 audit[2972]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.637000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc24846690 a2=0 a3=7ffc2484667c items=0 ppid=2840 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:37:13.645000 audit[2975]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.645000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc62d9d9d0 a2=0 a3=7ffc62d9d9bc items=0 ppid=2840 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:37:13.648000 audit[2976]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.648000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5b2644a0 a2=0 a3=7ffd5b26448c items=0 ppid=2840 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 20:37:13.654000 audit[2978]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.654000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda76e3190 a2=0 a3=7ffda76e317c items=0 ppid=2840 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 20:37:13.656000 audit[2979]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.656000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4b472a70 a2=0 a3=7fff4b472a5c items=0 ppid=2840 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 20:37:13.662000 audit[2981]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.662000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc98c3f680 a2=0 a3=7ffc98c3f66c items=0 ppid=2840 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:37:13.671000 audit[2984]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:37:13.671000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff44d16cb0 a2=0 a3=7fff44d16c9c items=0 ppid=2840 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:37:13.678000 audit[2986]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 20:37:13.678000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff4a2d6d10 a2=0 a3=7fff4a2d6cfc items=0 ppid=2840 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.678000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:13.679000 audit[2986]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 20:37:13.679000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff4a2d6d10 a2=0 a3=7fff4a2d6cfc items=0 ppid=2840 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:13.679000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:13.760127 kubelet[2559]: I0412 20:37:13.760072 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-z7tfw" podStartSLOduration=1.759992187 podCreationTimestamp="2024-04-12 20:37:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:37:13.759904785 +0000 UTC m=+14.108770617" watchObservedRunningTime="2024-04-12 20:37:13.759992187 +0000 UTC m=+14.108857930" Apr 12 20:37:14.775394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1368233458.mount: Deactivated successfully. Apr 12 20:37:15.674646 env[1475]: time="2024-04-12T20:37:15.674623019Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:15.675386 env[1475]: time="2024-04-12T20:37:15.675375426Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:15.676176 env[1475]: time="2024-04-12T20:37:15.676126667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:15.677110 env[1475]: time="2024-04-12T20:37:15.677092343Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:15.677930 env[1475]: time="2024-04-12T20:37:15.677881873Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 20:37:15.679172 env[1475]: time="2024-04-12T20:37:15.679136672Z" level=info msg="CreateContainer within sandbox \"542951df90ad1731d078c4c2f6cfad5072fa374af92b44c94425e59ac1d5c03e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 20:37:15.683750 env[1475]: time="2024-04-12T20:37:15.683682204Z" level=info msg="CreateContainer within sandbox \"542951df90ad1731d078c4c2f6cfad5072fa374af92b44c94425e59ac1d5c03e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3e5ccf3a5d035836485f8de15474ac846d79f137c26b79c240192a2891283bea\"" Apr 12 20:37:15.684049 env[1475]: time="2024-04-12T20:37:15.684003375Z" level=info msg="StartContainer for \"3e5ccf3a5d035836485f8de15474ac846d79f137c26b79c240192a2891283bea\"" Apr 12 20:37:15.693192 systemd[1]: Started cri-containerd-3e5ccf3a5d035836485f8de15474ac846d79f137c26b79c240192a2891283bea.scope. Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit: BPF prog-id=120 op=LOAD Apr 12 20:37:15.697000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.697000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2782 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:15.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365356363663361356430333538333634383566386465313534373461 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2782 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365356363663361356430333538333634383566386465313534373461 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit: BPF prog-id=121 op=LOAD Apr 12 20:37:15.698000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003049f0 items=0 ppid=2782 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365356363663361356430333538333634383566386465313534373461 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit: BPF prog-id=122 op=LOAD Apr 12 20:37:15.698000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000304a38 items=0 ppid=2782 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365356363663361356430333538333634383566386465313534373461 Apr 12 20:37:15.698000 audit: BPF prog-id=122 op=UNLOAD Apr 12 20:37:15.698000 audit: BPF prog-id=121 op=UNLOAD Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:15.698000 audit: BPF prog-id=123 op=LOAD Apr 12 20:37:15.698000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000304e48 items=0 ppid=2782 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365356363663361356430333538333634383566386465313534373461 Apr 12 20:37:15.705273 env[1475]: time="2024-04-12T20:37:15.705250129Z" level=info msg="StartContainer for \"3e5ccf3a5d035836485f8de15474ac846d79f137c26b79c240192a2891283bea\" returns successfully" Apr 12 20:37:15.754134 kubelet[2559]: I0412 20:37:15.754079 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-p999q" podStartSLOduration=1.282331088 podCreationTimestamp="2024-04-12 20:37:12 +0000 UTC" firstStartedPulling="2024-04-12 20:37:13.206430395 +0000 UTC m=+13.555296097" lastFinishedPulling="2024-04-12 20:37:15.678139548 +0000 UTC m=+16.027005250" observedRunningTime="2024-04-12 20:37:15.753800032 +0000 UTC m=+16.102665749" watchObservedRunningTime="2024-04-12 20:37:15.754040241 +0000 UTC m=+16.102905947" Apr 12 20:37:17.453000 audit[3039]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:17.453000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca7b65bd0 a2=0 a3=7ffca7b65bbc items=0 ppid=2840 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:17.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:17.453000 audit[3039]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:17.453000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca7b65bd0 a2=0 a3=0 items=0 ppid=2840 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:17.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:17.474000 audit[3041]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:17.474000 audit[3041]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffeba699570 a2=0 a3=7ffeba69955c items=0 ppid=2840 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:17.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:17.479000 audit[3041]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:17.479000 audit[3041]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeba699570 a2=0 a3=0 items=0 ppid=2840 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:17.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:17.679852 kubelet[2559]: I0412 20:37:17.679779 2559 topology_manager.go:215] "Topology Admit Handler" podUID="9d12f38b-49bd-4edf-a25c-2ef90817ef12" podNamespace="calico-system" podName="calico-typha-7c44f6fc65-8d7mb" Apr 12 20:37:17.698502 systemd[1]: Created slice kubepods-besteffort-pod9d12f38b_49bd_4edf_a25c_2ef90817ef12.slice. Apr 12 20:37:17.725710 kubelet[2559]: I0412 20:37:17.725635 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9d12f38b-49bd-4edf-a25c-2ef90817ef12-tigera-ca-bundle\") pod \"calico-typha-7c44f6fc65-8d7mb\" (UID: \"9d12f38b-49bd-4edf-a25c-2ef90817ef12\") " pod="calico-system/calico-typha-7c44f6fc65-8d7mb" Apr 12 20:37:17.725710 kubelet[2559]: I0412 20:37:17.725686 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/9d12f38b-49bd-4edf-a25c-2ef90817ef12-typha-certs\") pod \"calico-typha-7c44f6fc65-8d7mb\" (UID: \"9d12f38b-49bd-4edf-a25c-2ef90817ef12\") " pod="calico-system/calico-typha-7c44f6fc65-8d7mb" Apr 12 20:37:17.725868 kubelet[2559]: I0412 20:37:17.725733 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7gw8f\" (UniqueName: \"kubernetes.io/projected/9d12f38b-49bd-4edf-a25c-2ef90817ef12-kube-api-access-7gw8f\") pod \"calico-typha-7c44f6fc65-8d7mb\" (UID: \"9d12f38b-49bd-4edf-a25c-2ef90817ef12\") " pod="calico-system/calico-typha-7c44f6fc65-8d7mb" Apr 12 20:37:17.733120 kubelet[2559]: I0412 20:37:17.733099 2559 topology_manager.go:215] "Topology Admit Handler" podUID="3a77a01b-284c-4543-a9e3-addb3db74fb6" podNamespace="calico-system" podName="calico-node-q5g5h" Apr 12 20:37:17.736429 systemd[1]: Created slice kubepods-besteffort-pod3a77a01b_284c_4543_a9e3_addb3db74fb6.slice. Apr 12 20:37:17.826943 kubelet[2559]: I0412 20:37:17.826852 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-flexvol-driver-host\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.827237 kubelet[2559]: I0412 20:37:17.827001 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-cni-bin-dir\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.827416 kubelet[2559]: I0412 20:37:17.827357 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-var-run-calico\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.827551 kubelet[2559]: I0412 20:37:17.827472 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-var-lib-calico\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.827551 kubelet[2559]: I0412 20:37:17.827542 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-cni-log-dir\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.827837 kubelet[2559]: I0412 20:37:17.827687 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m7fgt\" (UniqueName: \"kubernetes.io/projected/3a77a01b-284c-4543-a9e3-addb3db74fb6-kube-api-access-m7fgt\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.828035 kubelet[2559]: I0412 20:37:17.827895 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-policysync\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.828243 kubelet[2559]: I0412 20:37:17.828157 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3a77a01b-284c-4543-a9e3-addb3db74fb6-node-certs\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.828458 kubelet[2559]: I0412 20:37:17.828267 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-cni-net-dir\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.828458 kubelet[2559]: I0412 20:37:17.828390 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-lib-modules\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.828885 kubelet[2559]: I0412 20:37:17.828477 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3a77a01b-284c-4543-a9e3-addb3db74fb6-xtables-lock\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.828885 kubelet[2559]: I0412 20:37:17.828570 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3a77a01b-284c-4543-a9e3-addb3db74fb6-tigera-ca-bundle\") pod \"calico-node-q5g5h\" (UID: \"3a77a01b-284c-4543-a9e3-addb3db74fb6\") " pod="calico-system/calico-node-q5g5h" Apr 12 20:37:17.864837 kubelet[2559]: I0412 20:37:17.864774 2559 topology_manager.go:215] "Topology Admit Handler" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" podNamespace="calico-system" podName="csi-node-driver-wpt8s" Apr 12 20:37:17.865675 kubelet[2559]: E0412 20:37:17.865601 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:17.929457 kubelet[2559]: I0412 20:37:17.929429 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/69d8987b-1887-4dd8-b32f-19146ddf433e-varrun\") pod \"csi-node-driver-wpt8s\" (UID: \"69d8987b-1887-4dd8-b32f-19146ddf433e\") " pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:17.929631 kubelet[2559]: I0412 20:37:17.929485 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/69d8987b-1887-4dd8-b32f-19146ddf433e-kubelet-dir\") pod \"csi-node-driver-wpt8s\" (UID: \"69d8987b-1887-4dd8-b32f-19146ddf433e\") " pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:17.929631 kubelet[2559]: I0412 20:37:17.929534 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/69d8987b-1887-4dd8-b32f-19146ddf433e-socket-dir\") pod \"csi-node-driver-wpt8s\" (UID: \"69d8987b-1887-4dd8-b32f-19146ddf433e\") " pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:17.929820 kubelet[2559]: I0412 20:37:17.929792 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/69d8987b-1887-4dd8-b32f-19146ddf433e-registration-dir\") pod \"csi-node-driver-wpt8s\" (UID: \"69d8987b-1887-4dd8-b32f-19146ddf433e\") " pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:17.929926 kubelet[2559]: I0412 20:37:17.929899 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xswvq\" (UniqueName: \"kubernetes.io/projected/69d8987b-1887-4dd8-b32f-19146ddf433e-kube-api-access-xswvq\") pod \"csi-node-driver-wpt8s\" (UID: \"69d8987b-1887-4dd8-b32f-19146ddf433e\") " pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:17.931397 kubelet[2559]: E0412 20:37:17.931367 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:17.931397 kubelet[2559]: W0412 20:37:17.931393 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:17.931586 kubelet[2559]: E0412 20:37:17.931425 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:17.933845 kubelet[2559]: E0412 20:37:17.933824 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:17.933845 kubelet[2559]: W0412 20:37:17.933844 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:17.934008 kubelet[2559]: E0412 20:37:17.933872 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:17.940146 kubelet[2559]: E0412 20:37:17.940100 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:17.940146 kubelet[2559]: W0412 20:37:17.940115 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:17.940146 kubelet[2559]: E0412 20:37:17.940140 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.012987 env[1475]: time="2024-04-12T20:37:18.012869010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c44f6fc65-8d7mb,Uid:9d12f38b-49bd-4edf-a25c-2ef90817ef12,Namespace:calico-system,Attempt:0,}" Apr 12 20:37:18.027277 env[1475]: time="2024-04-12T20:37:18.027181070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:18.027277 env[1475]: time="2024-04-12T20:37:18.027241925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:18.027560 env[1475]: time="2024-04-12T20:37:18.027282820Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:18.027560 env[1475]: time="2024-04-12T20:37:18.027479594Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0528987141eb926d340036d0969f73f15b5bd3f5a9544d8b9798e01feb6c507 pid=3056 runtime=io.containerd.runc.v2 Apr 12 20:37:18.031131 kubelet[2559]: E0412 20:37:18.031107 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.031131 kubelet[2559]: W0412 20:37:18.031126 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.031362 kubelet[2559]: E0412 20:37:18.031155 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.031439 kubelet[2559]: E0412 20:37:18.031411 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.031439 kubelet[2559]: W0412 20:37:18.031427 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.031561 kubelet[2559]: E0412 20:37:18.031453 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.031743 kubelet[2559]: E0412 20:37:18.031710 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.031743 kubelet[2559]: W0412 20:37:18.031722 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.031911 kubelet[2559]: E0412 20:37:18.031754 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.032015 kubelet[2559]: E0412 20:37:18.031995 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.032097 kubelet[2559]: W0412 20:37:18.032013 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.032097 kubelet[2559]: E0412 20:37:18.032041 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.032263 kubelet[2559]: E0412 20:37:18.032247 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.032263 kubelet[2559]: W0412 20:37:18.032260 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.032401 kubelet[2559]: E0412 20:37:18.032281 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.032491 kubelet[2559]: E0412 20:37:18.032476 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.032491 kubelet[2559]: W0412 20:37:18.032491 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.032625 kubelet[2559]: E0412 20:37:18.032511 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.032805 kubelet[2559]: E0412 20:37:18.032789 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.032910 kubelet[2559]: W0412 20:37:18.032806 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.032910 kubelet[2559]: E0412 20:37:18.032857 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.033100 kubelet[2559]: E0412 20:37:18.033057 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.033100 kubelet[2559]: W0412 20:37:18.033073 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.033275 kubelet[2559]: E0412 20:37:18.033112 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.033344 kubelet[2559]: E0412 20:37:18.033328 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.033344 kubelet[2559]: W0412 20:37:18.033340 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.033510 kubelet[2559]: E0412 20:37:18.033386 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.033580 kubelet[2559]: E0412 20:37:18.033549 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.033580 kubelet[2559]: W0412 20:37:18.033565 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.033689 kubelet[2559]: E0412 20:37:18.033603 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.033806 kubelet[2559]: E0412 20:37:18.033789 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.033889 kubelet[2559]: W0412 20:37:18.033808 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.033889 kubelet[2559]: E0412 20:37:18.033832 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.034041 kubelet[2559]: E0412 20:37:18.034022 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.034111 kubelet[2559]: W0412 20:37:18.034042 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.034111 kubelet[2559]: E0412 20:37:18.034063 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.034374 kubelet[2559]: E0412 20:37:18.034359 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.034374 kubelet[2559]: W0412 20:37:18.034372 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.034485 kubelet[2559]: E0412 20:37:18.034394 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.034656 kubelet[2559]: E0412 20:37:18.034640 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.034732 kubelet[2559]: W0412 20:37:18.034658 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.034732 kubelet[2559]: E0412 20:37:18.034686 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.035025 kubelet[2559]: E0412 20:37:18.035006 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.035025 kubelet[2559]: W0412 20:37:18.035025 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.035163 kubelet[2559]: E0412 20:37:18.035051 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.035341 kubelet[2559]: E0412 20:37:18.035317 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.035341 kubelet[2559]: W0412 20:37:18.035333 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.035534 kubelet[2559]: E0412 20:37:18.035360 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.035615 kubelet[2559]: E0412 20:37:18.035572 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.035615 kubelet[2559]: W0412 20:37:18.035584 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.035615 kubelet[2559]: E0412 20:37:18.035603 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.035946 kubelet[2559]: E0412 20:37:18.035925 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.035946 kubelet[2559]: W0412 20:37:18.035939 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.036131 kubelet[2559]: E0412 20:37:18.035961 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.036225 kubelet[2559]: E0412 20:37:18.036206 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.036225 kubelet[2559]: W0412 20:37:18.036218 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.036410 kubelet[2559]: E0412 20:37:18.036240 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.036503 kubelet[2559]: E0412 20:37:18.036468 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.036503 kubelet[2559]: W0412 20:37:18.036482 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.036619 kubelet[2559]: E0412 20:37:18.036525 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.036692 kubelet[2559]: E0412 20:37:18.036675 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.036692 kubelet[2559]: W0412 20:37:18.036688 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.036831 kubelet[2559]: E0412 20:37:18.036708 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.036950 kubelet[2559]: E0412 20:37:18.036918 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.036950 kubelet[2559]: W0412 20:37:18.036930 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.036950 kubelet[2559]: E0412 20:37:18.036948 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.037309 kubelet[2559]: E0412 20:37:18.037260 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.037309 kubelet[2559]: W0412 20:37:18.037281 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.037450 kubelet[2559]: E0412 20:37:18.037316 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.037582 kubelet[2559]: E0412 20:37:18.037565 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.037667 kubelet[2559]: W0412 20:37:18.037584 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.037667 kubelet[2559]: E0412 20:37:18.037617 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.037956 kubelet[2559]: E0412 20:37:18.037938 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.037956 kubelet[2559]: W0412 20:37:18.037952 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.038087 kubelet[2559]: E0412 20:37:18.037970 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.038401 env[1475]: time="2024-04-12T20:37:18.038353863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q5g5h,Uid:3a77a01b-284c-4543-a9e3-addb3db74fb6,Namespace:calico-system,Attempt:0,}" Apr 12 20:37:18.041553 systemd[1]: Started cri-containerd-d0528987141eb926d340036d0969f73f15b5bd3f5a9544d8b9798e01feb6c507.scope. Apr 12 20:37:18.044668 kubelet[2559]: E0412 20:37:18.044642 2559 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:37:18.044668 kubelet[2559]: W0412 20:37:18.044663 2559 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:37:18.044893 kubelet[2559]: E0412 20:37:18.044689 2559 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:37:18.051269 env[1475]: time="2024-04-12T20:37:18.051177707Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:18.051269 env[1475]: time="2024-04-12T20:37:18.051233106Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:18.051269 env[1475]: time="2024-04-12T20:37:18.051253161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:18.051620 env[1475]: time="2024-04-12T20:37:18.051468249Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1 pid=3116 runtime=io.containerd.runc.v2 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.084730 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 20:37:18.084821 kernel: audit: type=1400 audit(1712954238.055:1067): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148731 kernel: audit: type=1400 audit(1712954238.055:1068): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.150199 systemd[1]: Started cri-containerd-3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1.scope. Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.276216 kernel: audit: type=1400 audit(1712954238.055:1069): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.276279 kernel: audit: type=1400 audit(1712954238.055:1070): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.404586 kernel: audit: type=1400 audit(1712954238.055:1071): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.404636 kernel: audit: type=1400 audit(1712954238.055:1072): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.469736 kernel: audit: type=1400 audit(1712954238.055:1073): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.469772 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.147000 audit: BPF prog-id=124 op=LOAD Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.533756 kernel: audit: type=1400 audit(1712954238.055:1074): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.533777 kernel: audit: type=1400 audit(1712954238.055:1075): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3056 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430353238393837313431656239323664333430303336643039363966 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3056 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430353238393837313431656239323664333430303336643039363966 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.148000 audit: BPF prog-id=125 op=LOAD Apr 12 20:37:18.148000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098770 items=0 ppid=3056 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430353238393837313431656239323664333430303336643039363966 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit: BPF prog-id=126 op=LOAD Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313166346637656133353964366437666339363435613566376263 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313166346637656133353964366437666339363435613566376263 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit: BPF prog-id=127 op=LOAD Apr 12 20:37:18.275000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003761f0 items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313166346637656133353964366437666339363435613566376263 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.504000 audit[3144]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:18.504000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc6b798590 a2=0 a3=7ffc6b79857c items=0 ppid=2840 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:18.532000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.532000 audit: BPF prog-id=129 op=LOAD Apr 12 20:37:18.532000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000376238 items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313166346637656133353964366437666339363435613566376263 Apr 12 20:37:18.624000 audit: BPF prog-id=129 op=UNLOAD Apr 12 20:37:18.624000 audit: BPF prog-id=127 op=UNLOAD Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.275000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000987b8 items=0 ppid=3056 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430353238393837313431656239323664333430303336643039363966 Apr 12 20:37:18.688000 audit: BPF prog-id=128 op=UNLOAD Apr 12 20:37:18.688000 audit: BPF prog-id=125 op=UNLOAD Apr 12 20:37:18.624000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.624000 audit: BPF prog-id=130 op=LOAD Apr 12 20:37:18.624000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000376648 items=0 ppid=3116 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313166346637656133353964366437666339363435613566376263 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { perfmon } for pid=3065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit[3065]: AVC avc: denied { bpf } for pid=3065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:18.688000 audit: BPF prog-id=131 op=LOAD Apr 12 20:37:18.688000 audit[3065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098bc8 items=0 ppid=3056 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430353238393837313431656239323664333430303336643039363966 Apr 12 20:37:18.693401 env[1475]: time="2024-04-12T20:37:18.693369407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q5g5h,Uid:3a77a01b-284c-4543-a9e3-addb3db74fb6,Namespace:calico-system,Attempt:0,} returns sandbox id \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\"" Apr 12 20:37:18.694175 env[1475]: time="2024-04-12T20:37:18.694158903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 20:37:18.704000 audit[3144]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:18.704000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc6b798590 a2=0 a3=0 items=0 ppid=2840 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:18.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:18.705823 env[1475]: time="2024-04-12T20:37:18.705803709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c44f6fc65-8d7mb,Uid:9d12f38b-49bd-4edf-a25c-2ef90817ef12,Namespace:calico-system,Attempt:0,} returns sandbox id \"d0528987141eb926d340036d0969f73f15b5bd3f5a9544d8b9798e01feb6c507\"" Apr 12 20:37:19.706061 kubelet[2559]: E0412 20:37:19.706003 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:20.034120 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount113125404.mount: Deactivated successfully. Apr 12 20:37:21.705694 kubelet[2559]: E0412 20:37:21.705614 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:22.041747 env[1475]: time="2024-04-12T20:37:22.041661785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:22.042362 env[1475]: time="2024-04-12T20:37:22.042318852Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:22.043499 env[1475]: time="2024-04-12T20:37:22.043457565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:22.044503 env[1475]: time="2024-04-12T20:37:22.044460701Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:22.045475 env[1475]: time="2024-04-12T20:37:22.045433252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 20:37:22.045798 env[1475]: time="2024-04-12T20:37:22.045751427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 20:37:22.046295 env[1475]: time="2024-04-12T20:37:22.046251619Z" level=info msg="CreateContainer within sandbox \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 20:37:22.051057 env[1475]: time="2024-04-12T20:37:22.051036741Z" level=info msg="CreateContainer within sandbox \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c\"" Apr 12 20:37:22.051266 env[1475]: time="2024-04-12T20:37:22.051252465Z" level=info msg="StartContainer for \"fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c\"" Apr 12 20:37:22.060330 systemd[1]: Started cri-containerd-fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c.scope. Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f5e5df8f238 items=0 ppid=3116 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:22.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393734396230313864633632356530653936356630653537353161 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.066000 audit: BPF prog-id=132 op=LOAD Apr 12 20:37:22.066000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fbc58 items=0 ppid=3116 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:22.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393734396230313864633632356530653936356630653537353161 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit: BPF prog-id=133 op=LOAD Apr 12 20:37:22.067000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fbca8 items=0 ppid=3116 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:22.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393734396230313864633632356530653936356630653537353161 Apr 12 20:37:22.067000 audit: BPF prog-id=133 op=UNLOAD Apr 12 20:37:22.067000 audit: BPF prog-id=132 op=UNLOAD Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:22.067000 audit: BPF prog-id=134 op=LOAD Apr 12 20:37:22.067000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fbd38 items=0 ppid=3116 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:22.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662393734396230313864633632356530653936356630653537353161 Apr 12 20:37:22.074063 env[1475]: time="2024-04-12T20:37:22.074012609Z" level=info msg="StartContainer for \"fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c\" returns successfully" Apr 12 20:37:22.079386 systemd[1]: cri-containerd-fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c.scope: Deactivated successfully. Apr 12 20:37:22.084000 audit: BPF prog-id=134 op=UNLOAD Apr 12 20:37:22.088655 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c-rootfs.mount: Deactivated successfully. Apr 12 20:37:22.336800 env[1475]: time="2024-04-12T20:37:22.336551102Z" level=info msg="shim disconnected" id=fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c Apr 12 20:37:22.336800 env[1475]: time="2024-04-12T20:37:22.336663075Z" level=warning msg="cleaning up after shim disconnected" id=fb9749b018dc625e0e965f0e5751a58540dc05be123d0e1fc29ae5c1c2fc901c namespace=k8s.io Apr 12 20:37:22.336800 env[1475]: time="2024-04-12T20:37:22.336701806Z" level=info msg="cleaning up dead shim" Apr 12 20:37:22.356170 env[1475]: time="2024-04-12T20:37:22.356083828Z" level=warning msg="cleanup warnings time=\"2024-04-12T20:37:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3206 runtime=io.containerd.runc.v2\n" Apr 12 20:37:23.469326 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3198243866.mount: Deactivated successfully. Apr 12 20:37:23.705915 kubelet[2559]: E0412 20:37:23.705852 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:25.080242 env[1475]: time="2024-04-12T20:37:25.080128605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:25.082250 env[1475]: time="2024-04-12T20:37:25.082174051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:25.086323 env[1475]: time="2024-04-12T20:37:25.086266364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:25.090277 env[1475]: time="2024-04-12T20:37:25.090212084Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:25.092277 env[1475]: time="2024-04-12T20:37:25.092215322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 20:37:25.093035 env[1475]: time="2024-04-12T20:37:25.092975537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 20:37:25.105723 env[1475]: time="2024-04-12T20:37:25.105623006Z" level=info msg="CreateContainer within sandbox \"d0528987141eb926d340036d0969f73f15b5bd3f5a9544d8b9798e01feb6c507\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 20:37:25.118868 env[1475]: time="2024-04-12T20:37:25.118752840Z" level=info msg="CreateContainer within sandbox \"d0528987141eb926d340036d0969f73f15b5bd3f5a9544d8b9798e01feb6c507\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"97fbafc77ce67f8e7829defb12a318fc04772ba790d56b202ab737d3fa6374e7\"" Apr 12 20:37:25.119706 env[1475]: time="2024-04-12T20:37:25.119634216Z" level=info msg="StartContainer for \"97fbafc77ce67f8e7829defb12a318fc04772ba790d56b202ab737d3fa6374e7\"" Apr 12 20:37:25.144136 systemd[1]: Started cri-containerd-97fbafc77ce67f8e7829defb12a318fc04772ba790d56b202ab737d3fa6374e7.scope. Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.178620 kernel: kauditd_printk_skb: 156 callbacks suppressed Apr 12 20:37:25.178767 kernel: audit: type=1400 audit(1712954245.150:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.306071 kernel: audit: type=1400 audit(1712954245.150:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.306147 kernel: audit: type=1400 audit(1712954245.150:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.433572 kernel: audit: type=1400 audit(1712954245.150:1115): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.433611 kernel: audit: type=1400 audit(1712954245.150:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.561612 kernel: audit: type=1400 audit(1712954245.150:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.561676 kernel: audit: type=1400 audit(1712954245.150:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.689798 kernel: audit: type=1400 audit(1712954245.150:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.689849 kernel: audit: type=1400 audit(1712954245.150:1120): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.705796 kubelet[2559]: E0412 20:37:25.705742 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:25.753545 kernel: audit: type=1400 audit(1712954245.241:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.241000 audit: BPF prog-id=135 op=LOAD Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3056 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:25.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937666261666337376365363766386537383239646566623132613331 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3056 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:25.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937666261666337376365363766386537383239646566623132613331 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.242000 audit: BPF prog-id=136 op=LOAD Apr 12 20:37:25.242000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000220f40 items=0 ppid=3056 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:25.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937666261666337376365363766386537383239646566623132613331 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.368000 audit: BPF prog-id=137 op=LOAD Apr 12 20:37:25.368000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000220f88 items=0 ppid=3056 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:25.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937666261666337376365363766386537383239646566623132613331 Apr 12 20:37:25.496000 audit: BPF prog-id=137 op=UNLOAD Apr 12 20:37:25.496000 audit: BPF prog-id=136 op=UNLOAD Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:25.496000 audit: BPF prog-id=138 op=LOAD Apr 12 20:37:25.496000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221398 items=0 ppid=3056 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:25.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937666261666337376365363766386537383239646566623132613331 Apr 12 20:37:25.832924 env[1475]: time="2024-04-12T20:37:25.832900184Z" level=info msg="StartContainer for \"97fbafc77ce67f8e7829defb12a318fc04772ba790d56b202ab737d3fa6374e7\" returns successfully" Apr 12 20:37:26.424237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2321677058.mount: Deactivated successfully. Apr 12 20:37:26.798249 kubelet[2559]: I0412 20:37:26.798058 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7c44f6fc65-8d7mb" podStartSLOduration=3.411693102 podCreationTimestamp="2024-04-12 20:37:17 +0000 UTC" firstStartedPulling="2024-04-12 20:37:18.706331146 +0000 UTC m=+19.055196848" lastFinishedPulling="2024-04-12 20:37:25.092606164 +0000 UTC m=+25.441471911" observedRunningTime="2024-04-12 20:37:26.796425067 +0000 UTC m=+27.145290883" watchObservedRunningTime="2024-04-12 20:37:26.797968165 +0000 UTC m=+27.146833919" Apr 12 20:37:26.851000 audit[3275]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:26.851000 audit[3275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffef86ff2e0 a2=0 a3=7ffef86ff2cc items=0 ppid=2840 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:26.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:26.867000 audit[3275]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:26.867000 audit[3275]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffef86ff2e0 a2=0 a3=7ffef86ff2cc items=0 ppid=2840 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:26.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:27.705879 kubelet[2559]: E0412 20:37:27.705828 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:29.705956 kubelet[2559]: E0412 20:37:29.705911 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:29.809269 env[1475]: time="2024-04-12T20:37:29.809217980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:29.809788 env[1475]: time="2024-04-12T20:37:29.809737094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:29.810905 env[1475]: time="2024-04-12T20:37:29.810859128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:29.811940 env[1475]: time="2024-04-12T20:37:29.811904695Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:29.812705 env[1475]: time="2024-04-12T20:37:29.812691691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 20:37:29.813627 env[1475]: time="2024-04-12T20:37:29.813583853Z" level=info msg="CreateContainer within sandbox \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 20:37:29.818475 env[1475]: time="2024-04-12T20:37:29.818431351Z" level=info msg="CreateContainer within sandbox \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1\"" Apr 12 20:37:29.818676 env[1475]: time="2024-04-12T20:37:29.818666404Z" level=info msg="StartContainer for \"4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1\"" Apr 12 20:37:29.829040 systemd[1]: Started cri-containerd-4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1.scope. Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f74583a0718 items=0 ppid=3116 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336438393537383839323534323339633537343634353961643839 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit: BPF prog-id=139 op=LOAD Apr 12 20:37:29.834000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00020a888 items=0 ppid=3116 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336438393537383839323534323339633537343634353961643839 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit: BPF prog-id=140 op=LOAD Apr 12 20:37:29.834000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00020a8d8 items=0 ppid=3116 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336438393537383839323534323339633537343634353961643839 Apr 12 20:37:29.834000 audit: BPF prog-id=140 op=UNLOAD Apr 12 20:37:29.834000 audit: BPF prog-id=139 op=UNLOAD Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { perfmon } for pid=3283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit[3283]: AVC avc: denied { bpf } for pid=3283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:29.834000 audit: BPF prog-id=141 op=LOAD Apr 12 20:37:29.834000 audit[3283]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00020a968 items=0 ppid=3116 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:29.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465336438393537383839323534323339633537343634353961643839 Apr 12 20:37:29.840756 env[1475]: time="2024-04-12T20:37:29.840734365Z" level=info msg="StartContainer for \"4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1\" returns successfully" Apr 12 20:37:30.507764 env[1475]: time="2024-04-12T20:37:30.507618576Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 20:37:30.511798 systemd[1]: cri-containerd-4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1.scope: Deactivated successfully. Apr 12 20:37:30.526000 audit: BPF prog-id=141 op=UNLOAD Apr 12 20:37:30.562476 kubelet[2559]: I0412 20:37:30.562418 2559 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 20:37:30.563714 kernel: kauditd_printk_skb: 96 callbacks suppressed Apr 12 20:37:30.563791 kernel: audit: type=1334 audit(1712954250.526:1138): prog-id=141 op=UNLOAD Apr 12 20:37:30.576332 kubelet[2559]: I0412 20:37:30.576309 2559 topology_manager.go:215] "Topology Admit Handler" podUID="344d4fe4-a89a-47f1-9648-9a5f8f68118c" podNamespace="calico-system" podName="calico-kube-controllers-6888cd49dc-vtngz" Apr 12 20:37:30.576967 kubelet[2559]: I0412 20:37:30.576954 2559 topology_manager.go:215] "Topology Admit Handler" podUID="337e3327-836e-486a-b484-a95caf91ad42" podNamespace="kube-system" podName="coredns-5dd5756b68-jr58p" Apr 12 20:37:30.577200 kubelet[2559]: I0412 20:37:30.577190 2559 topology_manager.go:215] "Topology Admit Handler" podUID="e80621d2-7452-4af7-a8ed-f8d47a158285" podNamespace="kube-system" podName="coredns-5dd5756b68-knt85" Apr 12 20:37:30.579800 systemd[1]: Created slice kubepods-besteffort-pod344d4fe4_a89a_47f1_9648_9a5f8f68118c.slice. Apr 12 20:37:30.582519 systemd[1]: Created slice kubepods-burstable-pod337e3327_836e_486a_b484_a95caf91ad42.slice. Apr 12 20:37:30.584880 systemd[1]: Created slice kubepods-burstable-pode80621d2_7452_4af7_a8ed_f8d47a158285.slice. Apr 12 20:37:30.624097 kubelet[2559]: I0412 20:37:30.624081 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e80621d2-7452-4af7-a8ed-f8d47a158285-config-volume\") pod \"coredns-5dd5756b68-knt85\" (UID: \"e80621d2-7452-4af7-a8ed-f8d47a158285\") " pod="kube-system/coredns-5dd5756b68-knt85" Apr 12 20:37:30.624187 kubelet[2559]: I0412 20:37:30.624107 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6tmp\" (UniqueName: \"kubernetes.io/projected/e80621d2-7452-4af7-a8ed-f8d47a158285-kube-api-access-p6tmp\") pod \"coredns-5dd5756b68-knt85\" (UID: \"e80621d2-7452-4af7-a8ed-f8d47a158285\") " pod="kube-system/coredns-5dd5756b68-knt85" Apr 12 20:37:30.624187 kubelet[2559]: I0412 20:37:30.624122 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/344d4fe4-a89a-47f1-9648-9a5f8f68118c-tigera-ca-bundle\") pod \"calico-kube-controllers-6888cd49dc-vtngz\" (UID: \"344d4fe4-a89a-47f1-9648-9a5f8f68118c\") " pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" Apr 12 20:37:30.624187 kubelet[2559]: I0412 20:37:30.624137 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/337e3327-836e-486a-b484-a95caf91ad42-config-volume\") pod \"coredns-5dd5756b68-jr58p\" (UID: \"337e3327-836e-486a-b484-a95caf91ad42\") " pod="kube-system/coredns-5dd5756b68-jr58p" Apr 12 20:37:30.624187 kubelet[2559]: I0412 20:37:30.624151 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cmqg9\" (UniqueName: \"kubernetes.io/projected/344d4fe4-a89a-47f1-9648-9a5f8f68118c-kube-api-access-cmqg9\") pod \"calico-kube-controllers-6888cd49dc-vtngz\" (UID: \"344d4fe4-a89a-47f1-9648-9a5f8f68118c\") " pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" Apr 12 20:37:30.624187 kubelet[2559]: I0412 20:37:30.624162 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zsdr2\" (UniqueName: \"kubernetes.io/projected/337e3327-836e-486a-b484-a95caf91ad42-kube-api-access-zsdr2\") pod \"coredns-5dd5756b68-jr58p\" (UID: \"337e3327-836e-486a-b484-a95caf91ad42\") " pod="kube-system/coredns-5dd5756b68-jr58p" Apr 12 20:37:30.834968 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1-rootfs.mount: Deactivated successfully. Apr 12 20:37:30.882524 env[1475]: time="2024-04-12T20:37:30.882421022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6888cd49dc-vtngz,Uid:344d4fe4-a89a-47f1-9648-9a5f8f68118c,Namespace:calico-system,Attempt:0,}" Apr 12 20:37:30.885452 env[1475]: time="2024-04-12T20:37:30.885367111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jr58p,Uid:337e3327-836e-486a-b484-a95caf91ad42,Namespace:kube-system,Attempt:0,}" Apr 12 20:37:30.887556 env[1475]: time="2024-04-12T20:37:30.887451543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-knt85,Uid:e80621d2-7452-4af7-a8ed-f8d47a158285,Namespace:kube-system,Attempt:0,}" Apr 12 20:37:31.245061 env[1475]: time="2024-04-12T20:37:31.244964427Z" level=info msg="shim disconnected" id=4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1 Apr 12 20:37:31.245061 env[1475]: time="2024-04-12T20:37:31.245059954Z" level=warning msg="cleaning up after shim disconnected" id=4e3d8957889254239c5746459ad895d73585482ebe82d90db1f1c05184cdf9a1 namespace=k8s.io Apr 12 20:37:31.245432 env[1475]: time="2024-04-12T20:37:31.245087406Z" level=info msg="cleaning up dead shim" Apr 12 20:37:31.252942 env[1475]: time="2024-04-12T20:37:31.252886177Z" level=warning msg="cleanup warnings time=\"2024-04-12T20:37:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3337 runtime=io.containerd.runc.v2\n" Apr 12 20:37:31.334522 env[1475]: time="2024-04-12T20:37:31.334436400Z" level=error msg="Failed to destroy network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334522 env[1475]: time="2024-04-12T20:37:31.334506895Z" level=error msg="Failed to destroy network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334660 env[1475]: time="2024-04-12T20:37:31.334575512Z" level=error msg="Failed to destroy network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334691 env[1475]: time="2024-04-12T20:37:31.334673051Z" level=error msg="encountered an error cleaning up failed sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334716 env[1475]: time="2024-04-12T20:37:31.334696239Z" level=error msg="encountered an error cleaning up failed sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334716 env[1475]: time="2024-04-12T20:37:31.334705939Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jr58p,Uid:337e3327-836e-486a-b484-a95caf91ad42,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334772 env[1475]: time="2024-04-12T20:37:31.334734130Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6888cd49dc-vtngz,Uid:344d4fe4-a89a-47f1-9648-9a5f8f68118c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334772 env[1475]: time="2024-04-12T20:37:31.334752145Z" level=error msg="encountered an error cleaning up failed sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334858 env[1475]: time="2024-04-12T20:37:31.334777961Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-knt85,Uid:e80621d2-7452-4af7-a8ed-f8d47a158285,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334896 kubelet[2559]: E0412 20:37:31.334868 2559 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334896 kubelet[2559]: E0412 20:37:31.334870 2559 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.334896 kubelet[2559]: E0412 20:37:31.334886 2559 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.335149 kubelet[2559]: E0412 20:37:31.334906 2559 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-knt85" Apr 12 20:37:31.335149 kubelet[2559]: E0412 20:37:31.334912 2559 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" Apr 12 20:37:31.335149 kubelet[2559]: E0412 20:37:31.334911 2559 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-jr58p" Apr 12 20:37:31.335149 kubelet[2559]: E0412 20:37:31.334921 2559 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-knt85" Apr 12 20:37:31.335240 kubelet[2559]: E0412 20:37:31.334926 2559 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" Apr 12 20:37:31.335240 kubelet[2559]: E0412 20:37:31.334938 2559 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-jr58p" Apr 12 20:37:31.335240 kubelet[2559]: E0412 20:37:31.334956 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6888cd49dc-vtngz_calico-system(344d4fe4-a89a-47f1-9648-9a5f8f68118c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6888cd49dc-vtngz_calico-system(344d4fe4-a89a-47f1-9648-9a5f8f68118c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" podUID="344d4fe4-a89a-47f1-9648-9a5f8f68118c" Apr 12 20:37:31.335327 kubelet[2559]: E0412 20:37:31.334955 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-knt85_kube-system(e80621d2-7452-4af7-a8ed-f8d47a158285)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-knt85_kube-system(e80621d2-7452-4af7-a8ed-f8d47a158285)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-knt85" podUID="e80621d2-7452-4af7-a8ed-f8d47a158285" Apr 12 20:37:31.335327 kubelet[2559]: E0412 20:37:31.334978 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-jr58p_kube-system(337e3327-836e-486a-b484-a95caf91ad42)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-jr58p_kube-system(337e3327-836e-486a-b484-a95caf91ad42)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-jr58p" podUID="337e3327-836e-486a-b484-a95caf91ad42" Apr 12 20:37:31.336544 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e-shm.mount: Deactivated successfully. Apr 12 20:37:31.336620 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce-shm.mount: Deactivated successfully. Apr 12 20:37:31.336676 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6-shm.mount: Deactivated successfully. Apr 12 20:37:31.719221 systemd[1]: Created slice kubepods-besteffort-pod69d8987b_1887_4dd8_b32f_19146ddf433e.slice. Apr 12 20:37:31.724248 env[1475]: time="2024-04-12T20:37:31.724125402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wpt8s,Uid:69d8987b-1887-4dd8-b32f-19146ddf433e,Namespace:calico-system,Attempt:0,}" Apr 12 20:37:31.762861 env[1475]: time="2024-04-12T20:37:31.762799130Z" level=error msg="Failed to destroy network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.763030 env[1475]: time="2024-04-12T20:37:31.762986587Z" level=error msg="encountered an error cleaning up failed sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.763030 env[1475]: time="2024-04-12T20:37:31.763014343Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wpt8s,Uid:69d8987b-1887-4dd8-b32f-19146ddf433e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.763231 kubelet[2559]: E0412 20:37:31.763185 2559 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.763231 kubelet[2559]: E0412 20:37:31.763216 2559 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:31.763231 kubelet[2559]: E0412 20:37:31.763229 2559 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wpt8s" Apr 12 20:37:31.763316 kubelet[2559]: E0412 20:37:31.763264 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wpt8s_calico-system(69d8987b-1887-4dd8-b32f-19146ddf433e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wpt8s_calico-system(69d8987b-1887-4dd8-b32f-19146ddf433e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:31.785553 kubelet[2559]: I0412 20:37:31.785541 2559 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:31.786036 env[1475]: time="2024-04-12T20:37:31.786015782Z" level=info msg="StopPodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\"" Apr 12 20:37:31.786114 kubelet[2559]: I0412 20:37:31.786041 2559 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:31.786366 env[1475]: time="2024-04-12T20:37:31.786347818Z" level=info msg="StopPodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\"" Apr 12 20:37:31.786627 kubelet[2559]: I0412 20:37:31.786611 2559 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:37:31.786917 env[1475]: time="2024-04-12T20:37:31.786897671Z" level=info msg="StopPodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\"" Apr 12 20:37:31.789201 env[1475]: time="2024-04-12T20:37:31.788865253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 20:37:31.789312 kubelet[2559]: I0412 20:37:31.788947 2559 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:31.789357 env[1475]: time="2024-04-12T20:37:31.789281988Z" level=info msg="StopPodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\"" Apr 12 20:37:31.809122 env[1475]: time="2024-04-12T20:37:31.809051348Z" level=error msg="StopPodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" failed" error="failed to destroy network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.809254 env[1475]: time="2024-04-12T20:37:31.809148275Z" level=error msg="StopPodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" failed" error="failed to destroy network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.809365 kubelet[2559]: E0412 20:37:31.809328 2559 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:37:31.809421 kubelet[2559]: E0412 20:37:31.809377 2559 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:31.809421 kubelet[2559]: E0412 20:37:31.809390 2559 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e"} Apr 12 20:37:31.809421 kubelet[2559]: E0412 20:37:31.809402 2559 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6"} Apr 12 20:37:31.809517 kubelet[2559]: E0412 20:37:31.809426 2559 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"337e3327-836e-486a-b484-a95caf91ad42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:37:31.809517 kubelet[2559]: E0412 20:37:31.809433 2559 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"344d4fe4-a89a-47f1-9648-9a5f8f68118c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:37:31.809517 kubelet[2559]: E0412 20:37:31.809454 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"337e3327-836e-486a-b484-a95caf91ad42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-jr58p" podUID="337e3327-836e-486a-b484-a95caf91ad42" Apr 12 20:37:31.809694 kubelet[2559]: E0412 20:37:31.809456 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"344d4fe4-a89a-47f1-9648-9a5f8f68118c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" podUID="344d4fe4-a89a-47f1-9648-9a5f8f68118c" Apr 12 20:37:31.809694 kubelet[2559]: E0412 20:37:31.809639 2559 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:31.809694 kubelet[2559]: E0412 20:37:31.809662 2559 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186"} Apr 12 20:37:31.809694 kubelet[2559]: E0412 20:37:31.809692 2559 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"69d8987b-1887-4dd8-b32f-19146ddf433e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:37:31.809875 env[1475]: time="2024-04-12T20:37:31.809520573Z" level=error msg="StopPodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" failed" error="failed to destroy network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.809915 kubelet[2559]: E0412 20:37:31.809716 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"69d8987b-1887-4dd8-b32f-19146ddf433e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wpt8s" podUID="69d8987b-1887-4dd8-b32f-19146ddf433e" Apr 12 20:37:31.811664 env[1475]: time="2024-04-12T20:37:31.811606719Z" level=error msg="StopPodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" failed" error="failed to destroy network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:37:31.811760 kubelet[2559]: E0412 20:37:31.811746 2559 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:31.811809 kubelet[2559]: E0412 20:37:31.811769 2559 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce"} Apr 12 20:37:31.811809 kubelet[2559]: E0412 20:37:31.811798 2559 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e80621d2-7452-4af7-a8ed-f8d47a158285\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:37:31.811906 kubelet[2559]: E0412 20:37:31.811820 2559 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e80621d2-7452-4af7-a8ed-f8d47a158285\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-knt85" podUID="e80621d2-7452-4af7-a8ed-f8d47a158285" Apr 12 20:37:37.564246 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2881778615.mount: Deactivated successfully. Apr 12 20:37:37.590246 env[1475]: time="2024-04-12T20:37:37.590201818Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:37.590846 env[1475]: time="2024-04-12T20:37:37.590765039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:37.591462 env[1475]: time="2024-04-12T20:37:37.591430023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:37.592140 env[1475]: time="2024-04-12T20:37:37.592105673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:37.592481 env[1475]: time="2024-04-12T20:37:37.592421240Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 20:37:37.596734 env[1475]: time="2024-04-12T20:37:37.596714740Z" level=info msg="CreateContainer within sandbox \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 20:37:37.601990 env[1475]: time="2024-04-12T20:37:37.601945061Z" level=info msg="CreateContainer within sandbox \"3b11f4f7ea359d6d7fc9645a5f7bc93980077b6c7d9216428f15a171503f7dc1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7aea5627cd8a5c28adf8fe9fbd40921d8a33eabd860552ab5a5645c98c049908\"" Apr 12 20:37:37.602193 env[1475]: time="2024-04-12T20:37:37.602178196Z" level=info msg="StartContainer for \"7aea5627cd8a5c28adf8fe9fbd40921d8a33eabd860552ab5a5645c98c049908\"" Apr 12 20:37:37.610398 systemd[1]: Started cri-containerd-7aea5627cd8a5c28adf8fe9fbd40921d8a33eabd860552ab5a5645c98c049908.scope. Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c5006b578 items=0 ppid=3116 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:37.778662 kernel: audit: type=1400 audit(1712954257.618:1139): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.778711 kernel: audit: type=1300 audit(1712954257.618:1139): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c5006b578 items=0 ppid=3116 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:37.778736 kernel: audit: type=1327 audit(1712954257.618:1139): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656135363237636438613563323861646638666539666264343039 Apr 12 20:37:37.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656135363237636438613563323861646638666539666264343039 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.934277 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.934310 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:38.060410 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:38.060440 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:38.187686 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:38.187748 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:38.198064 env[1475]: time="2024-04-12T20:37:38.198013128Z" level=info msg="StartContainer for \"7aea5627cd8a5c28adf8fe9fbd40921d8a33eabd860552ab5a5645c98c049908\" returns successfully" Apr 12 20:37:38.251582 kernel: audit: type=1400 audit(1712954257.618:1140): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.618000 audit: BPF prog-id=142 op=LOAD Apr 12 20:37:37.618000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000276428 items=0 ppid=3116 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:37.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656135363237636438613563323861646638666539666264343039 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.870000 audit: BPF prog-id=143 op=LOAD Apr 12 20:37:37.870000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000276478 items=0 ppid=3116 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:37.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656135363237636438613563323861646638666539666264343039 Apr 12 20:37:37.996000 audit: BPF prog-id=143 op=UNLOAD Apr 12 20:37:37.996000 audit: BPF prog-id=142 op=UNLOAD Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:37.996000 audit: BPF prog-id=144 op=LOAD Apr 12 20:37:37.996000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000276508 items=0 ppid=3116 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:37.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761656135363237636438613563323861646638666539666264343039 Apr 12 20:37:38.399254 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 20:37:38.399294 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 20:37:38.826074 kubelet[2559]: I0412 20:37:38.826052 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-q5g5h" podStartSLOduration=2.927408169 podCreationTimestamp="2024-04-12 20:37:17 +0000 UTC" firstStartedPulling="2024-04-12 20:37:18.693987851 +0000 UTC m=+19.042853551" lastFinishedPulling="2024-04-12 20:37:37.592606967 +0000 UTC m=+37.941472671" observedRunningTime="2024-04-12 20:37:38.825383352 +0000 UTC m=+39.174249054" watchObservedRunningTime="2024-04-12 20:37:38.826027289 +0000 UTC m=+39.174892988" Apr 12 20:37:39.602000 audit[3834]: AVC avc: denied { write } for pid=3834 comm="tee" name="fd" dev="proc" ino=38037 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3840]: AVC avc: denied { write } for pid=3840 comm="tee" name="fd" dev="proc" ino=35179 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3835]: AVC avc: denied { write } for pid=3835 comm="tee" name="fd" dev="proc" ino=19373 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3837]: AVC avc: denied { write } for pid=3837 comm="tee" name="fd" dev="proc" ino=30431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3834]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8f8e0972 a2=241 a3=1b6 items=1 ppid=3797 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit[3840]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe064a4961 a2=241 a3=1b6 items=1 ppid=3798 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit[3837]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff84a93971 a2=241 a3=1b6 items=1 ppid=3804 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit[3835]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeea08f962 a2=241 a3=1b6 items=1 ppid=3800 pid=3835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=9115 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=38034 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=35176 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=19370 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.602000 audit[3844]: AVC avc: denied { write } for pid=3844 comm="tee" name="fd" dev="proc" ino=31624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3844]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6d0b9971 a2=241 a3=1b6 items=1 ppid=3799 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=31620 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.602000 audit[3836]: AVC avc: denied { write } for pid=3836 comm="tee" name="fd" dev="proc" ino=40011 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3836]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff978eb973 a2=241 a3=1b6 items=1 ppid=3801 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=30428 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.602000 audit[3846]: AVC avc: denied { write } for pid=3846 comm="tee" name="fd" dev="proc" ino=38041 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:37:39.602000 audit[3846]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0db97971 a2=241 a3=1b6 items=1 ppid=3802 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.602000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 20:37:39.602000 audit: PATH item=0 name="/dev/fd/63" inode=31621 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:37:39.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit: BPF prog-id=145 op=LOAD Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3d7ca510 a2=70 a3=7f55558b3000 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit: BPF prog-id=145 op=UNLOAD Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit: BPF prog-id=146 op=LOAD Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3d7ca510 a2=70 a3=6f items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit: BPF prog-id=146 op=UNLOAD Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff3d7ca4c0 a2=70 a3=7fff3d7ca510 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit: BPF prog-id=147 op=LOAD Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff3d7ca4a0 a2=70 a3=7fff3d7ca510 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit: BPF prog-id=147 op=UNLOAD Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d7ca580 a2=70 a3=0 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d7ca570 a2=70 a3=0 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3d7ca4e0 a2=70 a3=0 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff3d7ca5b0 a2=70 a3=ebae10 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3d7ca5b0 a2=70 a3=eb7880 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { perfmon } for pid=3971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit[3971]: AVC avc: denied { bpf } for pid=3971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.694000 audit: BPF prog-id=148 op=LOAD Apr 12 20:37:39.694000 audit[3971]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff3d7ca4d0 a2=70 a3=0 items=0 ppid=3809 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:37:39.696000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.696000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd45556590 a2=70 a3=fff80800 items=0 ppid=3809 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.696000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 20:37:39.696000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:39.696000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd45556460 a2=70 a3=3 items=0 ppid=3809 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.696000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 20:37:39.715000 audit: BPF prog-id=148 op=UNLOAD Apr 12 20:37:39.742000 audit[4031]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4031 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:39.742000 audit[4031]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc985e5760 a2=0 a3=7ffc985e574c items=0 ppid=3809 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.742000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:39.745000 audit[4029]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:39.745000 audit[4029]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffce5caba40 a2=0 a3=7ffce5caba2c items=0 ppid=3809 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.745000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:39.745000 audit[4030]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:39.745000 audit[4030]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd961c2780 a2=0 a3=7ffd961c276c items=0 ppid=3809 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.745000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:39.747000 audit[4034]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:39.747000 audit[4034]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe25bf9270 a2=0 a3=7ffe25bf925c items=0 ppid=3809 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:39.747000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:40.687385 systemd-networkd[1315]: vxlan.calico: Link UP Apr 12 20:37:40.687397 systemd-networkd[1315]: vxlan.calico: Gained carrier Apr 12 20:37:42.548094 systemd-networkd[1315]: vxlan.calico: Gained IPv6LL Apr 12 20:37:42.706271 env[1475]: time="2024-04-12T20:37:42.706134744Z" level=info msg="StopPodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\"" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.762 [INFO][4089] k8s.go 585: Cleaning up netns ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.762 [INFO][4089] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" iface="eth0" netns="/var/run/netns/cni-db6bd4d5-504a-9306-1129-9dc9eec15151" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.762 [INFO][4089] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" iface="eth0" netns="/var/run/netns/cni-db6bd4d5-504a-9306-1129-9dc9eec15151" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.763 [INFO][4089] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" iface="eth0" netns="/var/run/netns/cni-db6bd4d5-504a-9306-1129-9dc9eec15151" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.763 [INFO][4089] k8s.go 592: Releasing IP address(es) ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.763 [INFO][4089] utils.go 188: Calico CNI releasing IP address ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.773 [INFO][4104] ipam_plugin.go 415: Releasing address using handleID ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.773 [INFO][4104] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.773 [INFO][4104] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.777 [WARNING][4104] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.777 [INFO][4104] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.778 [INFO][4104] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:42.780281 env[1475]: 2024-04-12 20:37:42.779 [INFO][4089] k8s.go 598: Teardown processing complete. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:42.780596 env[1475]: time="2024-04-12T20:37:42.780353980Z" level=info msg="TearDown network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" successfully" Apr 12 20:37:42.780596 env[1475]: time="2024-04-12T20:37:42.780374129Z" level=info msg="StopPodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" returns successfully" Apr 12 20:37:42.780817 env[1475]: time="2024-04-12T20:37:42.780785640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6888cd49dc-vtngz,Uid:344d4fe4-a89a-47f1-9648-9a5f8f68118c,Namespace:calico-system,Attempt:1,}" Apr 12 20:37:42.781688 systemd[1]: run-netns-cni\x2ddb6bd4d5\x2d504a\x2d9306\x2d1129\x2d9dc9eec15151.mount: Deactivated successfully. Apr 12 20:37:42.848677 systemd-networkd[1315]: califa298890a15: Link UP Apr 12 20:37:42.904322 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:37:42.904376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califa298890a15: link becomes ready Apr 12 20:37:42.904430 systemd-networkd[1315]: califa298890a15: Gained carrier Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.804 [INFO][4120] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0 calico-kube-controllers-6888cd49dc- calico-system 344d4fe4-a89a-47f1-9648-9a5f8f68118c 669 0 2024-04-12 20:37:17 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6888cd49dc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-413b88e4ca calico-kube-controllers-6888cd49dc-vtngz eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califa298890a15 [] []}} ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.804 [INFO][4120] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.821 [INFO][4142] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" HandleID="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.828 [INFO][4142] ipam_plugin.go 268: Auto assigning IP ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" HandleID="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022ff40), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-413b88e4ca", "pod":"calico-kube-controllers-6888cd49dc-vtngz", "timestamp":"2024-04-12 20:37:42.821753515 +0000 UTC"}, Hostname:"ci-3510.3.3-a-413b88e4ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.828 [INFO][4142] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.828 [INFO][4142] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.828 [INFO][4142] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-413b88e4ca' Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.829 [INFO][4142] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.832 [INFO][4142] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.835 [INFO][4142] ipam.go 489: Trying affinity for 192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.837 [INFO][4142] ipam.go 155: Attempting to load block cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.838 [INFO][4142] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.838 [INFO][4142] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.64/26 handle="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.840 [INFO][4142] ipam.go 1682: Creating new handle: k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321 Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.842 [INFO][4142] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.64/26 handle="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.845 [INFO][4142] ipam.go 1216: Successfully claimed IPs: [192.168.78.65/26] block=192.168.78.64/26 handle="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.845 [INFO][4142] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.65/26] handle="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.845 [INFO][4142] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:42.916765 env[1475]: 2024-04-12 20:37:42.845 [INFO][4142] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.65/26] IPv6=[] ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" HandleID="k8s-pod-network.a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.917198 env[1475]: 2024-04-12 20:37:42.847 [INFO][4120] k8s.go 385: Populated endpoint ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0", GenerateName:"calico-kube-controllers-6888cd49dc-", Namespace:"calico-system", SelfLink:"", UID:"344d4fe4-a89a-47f1-9648-9a5f8f68118c", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6888cd49dc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"", Pod:"calico-kube-controllers-6888cd49dc-vtngz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califa298890a15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:42.917198 env[1475]: 2024-04-12 20:37:42.847 [INFO][4120] k8s.go 386: Calico CNI using IPs: [192.168.78.65/32] ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.917198 env[1475]: 2024-04-12 20:37:42.847 [INFO][4120] dataplane_linux.go 68: Setting the host side veth name to califa298890a15 ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.917198 env[1475]: 2024-04-12 20:37:42.904 [INFO][4120] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.917198 env[1475]: 2024-04-12 20:37:42.904 [INFO][4120] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0", GenerateName:"calico-kube-controllers-6888cd49dc-", Namespace:"calico-system", SelfLink:"", UID:"344d4fe4-a89a-47f1-9648-9a5f8f68118c", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6888cd49dc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321", Pod:"calico-kube-controllers-6888cd49dc-vtngz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califa298890a15", MAC:"b2:6a:6b:2f:ba:7a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:42.917198 env[1475]: 2024-04-12 20:37:42.915 [INFO][4120] k8s.go 498: Wrote updated endpoint to datastore ContainerID="a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321" Namespace="calico-system" Pod="calico-kube-controllers-6888cd49dc-vtngz" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:42.922372 env[1475]: time="2024-04-12T20:37:42.922305779Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:42.922372 env[1475]: time="2024-04-12T20:37:42.922330987Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:42.922372 env[1475]: time="2024-04-12T20:37:42.922338131Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:42.922503 env[1475]: time="2024-04-12T20:37:42.922415300Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321 pid=4182 runtime=io.containerd.runc.v2 Apr 12 20:37:42.922000 audit[4187]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:42.931239 systemd[1]: Started cri-containerd-a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321.scope. Apr 12 20:37:42.949504 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 20:37:42.949545 kernel: audit: type=1325 audit(1712954262.922:1172): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:42.922000 audit[4187]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffff816d330 a2=0 a3=7ffff816d31c items=0 ppid=3809 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.007796 kernel: audit: type=1300 audit(1712954262.922:1172): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffff816d330 a2=0 a3=7ffff816d31c items=0 ppid=3809 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:42.922000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:43.163091 kernel: audit: type=1327 audit(1712954262.922:1172): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:43.163137 kernel: audit: type=1400 audit(1712954263.013:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.225062 kernel: audit: type=1400 audit(1712954263.013:1174): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286983 kernel: audit: type=1400 audit(1712954263.013:1175): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.348908 kernel: audit: type=1400 audit(1712954263.013:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.411238 kernel: audit: type=1400 audit(1712954263.013:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.535929 kernel: audit: type=1400 audit(1712954263.013:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.535963 kernel: audit: type=1400 audit(1712954263.013:1179): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit: BPF prog-id=149 op=LOAD Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4182 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313338333434636136303233333934333833353535323166663865 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4182 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313338333434636136303233333934333833353535323166663865 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.162000 audit: BPF prog-id=150 op=LOAD Apr 12 20:37:43.162000 audit[4193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d8190 items=0 ppid=4182 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313338333434636136303233333934333833353535323166663865 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.286000 audit: BPF prog-id=151 op=LOAD Apr 12 20:37:43.286000 audit[4193]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d81d8 items=0 ppid=4182 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313338333434636136303233333934333833353535323166663865 Apr 12 20:37:43.410000 audit: BPF prog-id=151 op=UNLOAD Apr 12 20:37:43.410000 audit: BPF prog-id=150 op=UNLOAD Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { perfmon } for pid=4193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit[4193]: AVC avc: denied { bpf } for pid=4193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.410000 audit: BPF prog-id=152 op=LOAD Apr 12 20:37:43.410000 audit[4193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d85e8 items=0 ppid=4182 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313338333434636136303233333934333833353535323166663865 Apr 12 20:37:43.614509 env[1475]: time="2024-04-12T20:37:43.614482703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6888cd49dc-vtngz,Uid:344d4fe4-a89a-47f1-9648-9a5f8f68118c,Namespace:calico-system,Attempt:1,} returns sandbox id \"a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321\"" Apr 12 20:37:43.615139 env[1475]: time="2024-04-12T20:37:43.615125135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 20:37:43.705720 env[1475]: time="2024-04-12T20:37:43.705696808Z" level=info msg="StopPodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\"" Apr 12 20:37:43.705720 env[1475]: time="2024-04-12T20:37:43.705704119Z" level=info msg="StopPodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\"" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.728 [INFO][4250] k8s.go 585: Cleaning up netns ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.729 [INFO][4250] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" iface="eth0" netns="/var/run/netns/cni-b5b208cd-4ebf-1361-8f9f-22edcd76de50" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.729 [INFO][4250] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" iface="eth0" netns="/var/run/netns/cni-b5b208cd-4ebf-1361-8f9f-22edcd76de50" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.729 [INFO][4250] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" iface="eth0" netns="/var/run/netns/cni-b5b208cd-4ebf-1361-8f9f-22edcd76de50" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.729 [INFO][4250] k8s.go 592: Releasing IP address(es) ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.729 [INFO][4250] utils.go 188: Calico CNI releasing IP address ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.739 [INFO][4282] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.739 [INFO][4282] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.739 [INFO][4282] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.743 [WARNING][4282] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.743 [INFO][4282] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.744 [INFO][4282] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:43.746051 env[1475]: 2024-04-12 20:37:43.745 [INFO][4250] k8s.go 598: Teardown processing complete. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:43.746498 env[1475]: time="2024-04-12T20:37:43.746062605Z" level=info msg="TearDown network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" successfully" Apr 12 20:37:43.746498 env[1475]: time="2024-04-12T20:37:43.746084661Z" level=info msg="StopPodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" returns successfully" Apr 12 20:37:43.746498 env[1475]: time="2024-04-12T20:37:43.746482858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wpt8s,Uid:69d8987b-1887-4dd8-b32f-19146ddf433e,Namespace:calico-system,Attempt:1,}" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.730 [INFO][4249] k8s.go 585: Cleaning up netns ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.730 [INFO][4249] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" iface="eth0" netns="/var/run/netns/cni-e1d40b60-2f26-e5c0-1845-b053d12096db" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.730 [INFO][4249] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" iface="eth0" netns="/var/run/netns/cni-e1d40b60-2f26-e5c0-1845-b053d12096db" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.730 [INFO][4249] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" iface="eth0" netns="/var/run/netns/cni-e1d40b60-2f26-e5c0-1845-b053d12096db" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.730 [INFO][4249] k8s.go 592: Releasing IP address(es) ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.730 [INFO][4249] utils.go 188: Calico CNI releasing IP address ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.739 [INFO][4286] ipam_plugin.go 415: Releasing address using handleID ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.740 [INFO][4286] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.744 [INFO][4286] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.748 [WARNING][4286] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.748 [INFO][4286] ipam_plugin.go 443: Releasing address using workloadID ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.749 [INFO][4286] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:43.750832 env[1475]: 2024-04-12 20:37:43.750 [INFO][4249] k8s.go 598: Teardown processing complete. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:43.751183 env[1475]: time="2024-04-12T20:37:43.750894709Z" level=info msg="TearDown network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" successfully" Apr 12 20:37:43.751183 env[1475]: time="2024-04-12T20:37:43.750909954Z" level=info msg="StopPodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" returns successfully" Apr 12 20:37:43.751292 env[1475]: time="2024-04-12T20:37:43.751277351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-knt85,Uid:e80621d2-7452-4af7-a8ed-f8d47a158285,Namespace:kube-system,Attempt:1,}" Apr 12 20:37:43.783243 systemd[1]: run-netns-cni\x2db5b208cd\x2d4ebf\x2d1361\x2d8f9f\x2d22edcd76de50.mount: Deactivated successfully. Apr 12 20:37:43.783295 systemd[1]: run-netns-cni\x2de1d40b60\x2d2f26\x2de5c0\x2d1845\x2db053d12096db.mount: Deactivated successfully. Apr 12 20:37:43.809142 systemd-networkd[1315]: cali11dfea7d7e3: Link UP Apr 12 20:37:43.837736 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali11dfea7d7e3: link becomes ready Apr 12 20:37:43.837766 systemd-networkd[1315]: cali11dfea7d7e3: Gained carrier Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.769 [INFO][4315] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0 csi-node-driver- calico-system 69d8987b-1887-4dd8-b32f-19146ddf433e 677 0 2024-04-12 20:37:17 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-413b88e4ca csi-node-driver-wpt8s eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali11dfea7d7e3 [] []}} ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.769 [INFO][4315] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.785 [INFO][4360] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" HandleID="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.791 [INFO][4360] ipam_plugin.go 268: Auto assigning IP ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" HandleID="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f0a10), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-413b88e4ca", "pod":"csi-node-driver-wpt8s", "timestamp":"2024-04-12 20:37:43.785107125 +0000 UTC"}, Hostname:"ci-3510.3.3-a-413b88e4ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.791 [INFO][4360] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.791 [INFO][4360] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.791 [INFO][4360] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-413b88e4ca' Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.793 [INFO][4360] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.795 [INFO][4360] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.798 [INFO][4360] ipam.go 489: Trying affinity for 192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.800 [INFO][4360] ipam.go 155: Attempting to load block cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.801 [INFO][4360] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.801 [INFO][4360] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.64/26 handle="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.802 [INFO][4360] ipam.go 1682: Creating new handle: k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.804 [INFO][4360] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.64/26 handle="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.807 [INFO][4360] ipam.go 1216: Successfully claimed IPs: [192.168.78.66/26] block=192.168.78.64/26 handle="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.807 [INFO][4360] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.66/26] handle="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.807 [INFO][4360] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:43.843053 env[1475]: 2024-04-12 20:37:43.807 [INFO][4360] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.66/26] IPv6=[] ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" HandleID="k8s-pod-network.6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.843771 env[1475]: 2024-04-12 20:37:43.808 [INFO][4315] k8s.go 385: Populated endpoint ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"69d8987b-1887-4dd8-b32f-19146ddf433e", ResourceVersion:"677", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"", Pod:"csi-node-driver-wpt8s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11dfea7d7e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:43.843771 env[1475]: 2024-04-12 20:37:43.808 [INFO][4315] k8s.go 386: Calico CNI using IPs: [192.168.78.66/32] ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.843771 env[1475]: 2024-04-12 20:37:43.808 [INFO][4315] dataplane_linux.go 68: Setting the host side veth name to cali11dfea7d7e3 ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.843771 env[1475]: 2024-04-12 20:37:43.837 [INFO][4315] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.843771 env[1475]: 2024-04-12 20:37:43.837 [INFO][4315] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"69d8987b-1887-4dd8-b32f-19146ddf433e", ResourceVersion:"677", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c", Pod:"csi-node-driver-wpt8s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11dfea7d7e3", MAC:"fe:a8:53:0b:07:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:43.843771 env[1475]: 2024-04-12 20:37:43.842 [INFO][4315] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c" Namespace="calico-system" Pod="csi-node-driver-wpt8s" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:43.848375 env[1475]: time="2024-04-12T20:37:43.848328965Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:43.848375 env[1475]: time="2024-04-12T20:37:43.848350004Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:43.848375 env[1475]: time="2024-04-12T20:37:43.848356633Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:43.848510 env[1475]: time="2024-04-12T20:37:43.848421478Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c pid=4416 runtime=io.containerd.runc.v2 Apr 12 20:37:43.849000 audit[4426]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:43.849000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=18640 a0=3 a1=7ffdc1141940 a2=0 a3=7ffdc114192c items=0 ppid=3809 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.849000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:43.852104 systemd-networkd[1315]: calideb07c007cb: Link UP Apr 12 20:37:43.855461 systemd[1]: Started cri-containerd-6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c.scope. Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906904 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:37:43.906948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calideb07c007cb: link becomes ready Apr 12 20:37:43.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit: BPF prog-id=153 op=LOAD Apr 12 20:37:43.906962 systemd-networkd[1315]: calideb07c007cb: Gained carrier Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4416 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303261333139393537303331303938643633663530636234353162 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4416 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303261333139393537303331303938643633663530636234353162 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit: BPF prog-id=154 op=LOAD Apr 12 20:37:43.906000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cdf50 items=0 ppid=4416 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303261333139393537303331303938643633663530636234353162 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit: BPF prog-id=155 op=LOAD Apr 12 20:37:43.906000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cdf98 items=0 ppid=4416 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303261333139393537303331303938643633663530636234353162 Apr 12 20:37:43.906000 audit: BPF prog-id=155 op=UNLOAD Apr 12 20:37:43.906000 audit: BPF prog-id=154 op=UNLOAD Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.906000 audit: BPF prog-id=156 op=LOAD Apr 12 20:37:43.906000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039e3a8 items=0 ppid=4416 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638303261333139393537303331303938643633663530636234353162 Apr 12 20:37:43.912460 env[1475]: time="2024-04-12T20:37:43.912415020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wpt8s,Uid:69d8987b-1887-4dd8-b32f-19146ddf433e,Namespace:calico-system,Attempt:1,} returns sandbox id \"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c\"" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.772 [INFO][4332] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0 coredns-5dd5756b68- kube-system e80621d2-7452-4af7-a8ed-f8d47a158285 678 0 2024-04-12 20:37:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-413b88e4ca coredns-5dd5756b68-knt85 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calideb07c007cb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.772 [INFO][4332] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.787 [INFO][4367] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" HandleID="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.793 [INFO][4367] ipam_plugin.go 268: Auto assigning IP ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" HandleID="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003439e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-413b88e4ca", "pod":"coredns-5dd5756b68-knt85", "timestamp":"2024-04-12 20:37:43.787633918 +0000 UTC"}, Hostname:"ci-3510.3.3-a-413b88e4ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.793 [INFO][4367] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.807 [INFO][4367] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.807 [INFO][4367] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-413b88e4ca' Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.808 [INFO][4367] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.811 [INFO][4367] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.839 [INFO][4367] ipam.go 489: Trying affinity for 192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.841 [INFO][4367] ipam.go 155: Attempting to load block cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.842 [INFO][4367] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.842 [INFO][4367] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.64/26 handle="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.844 [INFO][4367] ipam.go 1682: Creating new handle: k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406 Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.846 [INFO][4367] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.64/26 handle="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.849 [INFO][4367] ipam.go 1216: Successfully claimed IPs: [192.168.78.67/26] block=192.168.78.64/26 handle="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.849 [INFO][4367] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.67/26] handle="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.849 [INFO][4367] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:43.913335 env[1475]: 2024-04-12 20:37:43.849 [INFO][4367] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.67/26] IPv6=[] ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" HandleID="k8s-pod-network.3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.913802 env[1475]: 2024-04-12 20:37:43.851 [INFO][4332] k8s.go 385: Populated endpoint ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e80621d2-7452-4af7-a8ed-f8d47a158285", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"", Pod:"coredns-5dd5756b68-knt85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideb07c007cb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:43.913802 env[1475]: 2024-04-12 20:37:43.851 [INFO][4332] k8s.go 386: Calico CNI using IPs: [192.168.78.67/32] ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.913802 env[1475]: 2024-04-12 20:37:43.851 [INFO][4332] dataplane_linux.go 68: Setting the host side veth name to calideb07c007cb ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.913802 env[1475]: 2024-04-12 20:37:43.907 [INFO][4332] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.913802 env[1475]: 2024-04-12 20:37:43.907 [INFO][4332] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e80621d2-7452-4af7-a8ed-f8d47a158285", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406", Pod:"coredns-5dd5756b68-knt85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideb07c007cb", MAC:"2e:9c:75:7c:a6:59", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:43.913802 env[1475]: 2024-04-12 20:37:43.912 [INFO][4332] k8s.go 498: Wrote updated endpoint to datastore ContainerID="3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406" Namespace="kube-system" Pod="coredns-5dd5756b68-knt85" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:43.919000 audit[4465]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=4465 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:43.919000 audit[4465]: SYSCALL arch=c000003e syscall=46 success=yes exit=22780 a0=3 a1=7ffd0b5eede0 a2=0 a3=7ffd0b5eedcc items=0 ppid=3809 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.919000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:43.929760 env[1475]: time="2024-04-12T20:37:43.929686279Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:43.929760 env[1475]: time="2024-04-12T20:37:43.929708845Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:43.929760 env[1475]: time="2024-04-12T20:37:43.929715974Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:43.929875 env[1475]: time="2024-04-12T20:37:43.929838059Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406 pid=4473 runtime=io.containerd.runc.v2 Apr 12 20:37:43.936249 systemd[1]: Started cri-containerd-3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406.scope. Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.940000 audit: BPF prog-id=157 op=LOAD Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653139383831623738663364663035653361303536313939643738 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653139383831623738663364663035653361303536313939643738 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit: BPF prog-id=158 op=LOAD Apr 12 20:37:43.941000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da890 items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653139383831623738663364663035653361303536313939643738 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit: BPF prog-id=159 op=LOAD Apr 12 20:37:43.941000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da8d8 items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653139383831623738663364663035653361303536313939643738 Apr 12 20:37:43.941000 audit: BPF prog-id=159 op=UNLOAD Apr 12 20:37:43.941000 audit: BPF prog-id=158 op=UNLOAD Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.941000 audit: BPF prog-id=160 op=LOAD Apr 12 20:37:43.941000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dace8 items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653139383831623738663364663035653361303536313939643738 Apr 12 20:37:43.957944 env[1475]: time="2024-04-12T20:37:43.957917965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-knt85,Uid:e80621d2-7452-4af7-a8ed-f8d47a158285,Namespace:kube-system,Attempt:1,} returns sandbox id \"3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406\"" Apr 12 20:37:43.959178 env[1475]: time="2024-04-12T20:37:43.959161254Z" level=info msg="CreateContainer within sandbox \"3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 20:37:43.963721 env[1475]: time="2024-04-12T20:37:43.963682584Z" level=info msg="CreateContainer within sandbox \"3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"67897b5de977133c6b5172f260946acd1bcc90bc49742e0cbf4f19730e4f449b\"" Apr 12 20:37:43.963906 env[1475]: time="2024-04-12T20:37:43.963866029Z" level=info msg="StartContainer for \"67897b5de977133c6b5172f260946acd1bcc90bc49742e0cbf4f19730e4f449b\"" Apr 12 20:37:43.971004 systemd[1]: Started cri-containerd-67897b5de977133c6b5172f260946acd1bcc90bc49742e0cbf4f19730e4f449b.scope. Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.976000 audit: BPF prog-id=161 op=LOAD Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4473 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383937623564653937373133336336623531373266323630393436 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4473 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383937623564653937373133336336623531373266323630393436 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit: BPF prog-id=162 op=LOAD Apr 12 20:37:43.977000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000221860 items=0 ppid=4473 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383937623564653937373133336336623531373266323630393436 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit: BPF prog-id=163 op=LOAD Apr 12 20:37:43.977000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002218a8 items=0 ppid=4473 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383937623564653937373133336336623531373266323630393436 Apr 12 20:37:43.977000 audit: BPF prog-id=163 op=UNLOAD Apr 12 20:37:43.977000 audit: BPF prog-id=162 op=UNLOAD Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:43.977000 audit: BPF prog-id=164 op=LOAD Apr 12 20:37:43.977000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000221cb8 items=0 ppid=4473 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:43.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383937623564653937373133336336623531373266323630393436 Apr 12 20:37:43.983564 env[1475]: time="2024-04-12T20:37:43.983539553Z" level=info msg="StartContainer for \"67897b5de977133c6b5172f260946acd1bcc90bc49742e0cbf4f19730e4f449b\" returns successfully" Apr 12 20:37:44.832094 kubelet[2559]: I0412 20:37:44.832052 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-knt85" podStartSLOduration=32.832008962 podCreationTimestamp="2024-04-12 20:37:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:37:44.831947858 +0000 UTC m=+45.180813577" watchObservedRunningTime="2024-04-12 20:37:44.832008962 +0000 UTC m=+45.180874678" Apr 12 20:37:44.845000 audit[4559]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:44.845000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff10c782c0 a2=0 a3=7fff10c782ac items=0 ppid=2840 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:44.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:44.852811 systemd-networkd[1315]: califa298890a15: Gained IPv6LL Apr 12 20:37:44.845000 audit[4559]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:44.845000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff10c782c0 a2=0 a3=0 items=0 ppid=2840 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:44.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:44.860000 audit[4561]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=4561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:44.860000 audit[4561]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe7000b620 a2=0 a3=7ffe7000b60c items=0 ppid=2840 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:44.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:44.866000 audit[4561]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:44.866000 audit[4561]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe7000b620 a2=0 a3=7ffe7000b60c items=0 ppid=2840 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:44.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:45.620146 systemd-networkd[1315]: cali11dfea7d7e3: Gained IPv6LL Apr 12 20:37:45.811995 systemd-networkd[1315]: calideb07c007cb: Gained IPv6LL Apr 12 20:37:46.705544 env[1475]: time="2024-04-12T20:37:46.705496528Z" level=info msg="StopPodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\"" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.730 [INFO][4580] k8s.go 585: Cleaning up netns ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.730 [INFO][4580] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" iface="eth0" netns="/var/run/netns/cni-1a9c6451-b200-b2e0-c268-e14b68e94099" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.731 [INFO][4580] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" iface="eth0" netns="/var/run/netns/cni-1a9c6451-b200-b2e0-c268-e14b68e94099" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.731 [INFO][4580] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" iface="eth0" netns="/var/run/netns/cni-1a9c6451-b200-b2e0-c268-e14b68e94099" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.731 [INFO][4580] k8s.go 592: Releasing IP address(es) ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.731 [INFO][4580] utils.go 188: Calico CNI releasing IP address ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.741 [INFO][4594] ipam_plugin.go 415: Releasing address using handleID ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.741 [INFO][4594] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.741 [INFO][4594] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.745 [WARNING][4594] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.745 [INFO][4594] ipam_plugin.go 443: Releasing address using workloadID ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.746 [INFO][4594] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:46.747827 env[1475]: 2024-04-12 20:37:46.747 [INFO][4580] k8s.go 598: Teardown processing complete. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:37:46.748200 env[1475]: time="2024-04-12T20:37:46.747937994Z" level=info msg="TearDown network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" successfully" Apr 12 20:37:46.748200 env[1475]: time="2024-04-12T20:37:46.747964832Z" level=info msg="StopPodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" returns successfully" Apr 12 20:37:46.748408 env[1475]: time="2024-04-12T20:37:46.748380458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jr58p,Uid:337e3327-836e-486a-b484-a95caf91ad42,Namespace:kube-system,Attempt:1,}" Apr 12 20:37:46.749468 systemd[1]: run-netns-cni\x2d1a9c6451\x2db200\x2db2e0\x2dc268\x2de14b68e94099.mount: Deactivated successfully. Apr 12 20:37:46.807593 systemd-networkd[1315]: cali35b195f9884: Link UP Apr 12 20:37:46.861219 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:37:46.861299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali35b195f9884: link becomes ready Apr 12 20:37:46.861284 systemd-networkd[1315]: cali35b195f9884: Gained carrier Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.769 [INFO][4612] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0 coredns-5dd5756b68- kube-system 337e3327-836e-486a-b484-a95caf91ad42 703 0 2024-04-12 20:37:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-413b88e4ca coredns-5dd5756b68-jr58p eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali35b195f9884 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.769 [INFO][4612] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.783 [INFO][4634] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" HandleID="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.789 [INFO][4634] ipam_plugin.go 268: Auto assigning IP ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" HandleID="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00052e230), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-413b88e4ca", "pod":"coredns-5dd5756b68-jr58p", "timestamp":"2024-04-12 20:37:46.783452721 +0000 UTC"}, Hostname:"ci-3510.3.3-a-413b88e4ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.789 [INFO][4634] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.790 [INFO][4634] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.790 [INFO][4634] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-413b88e4ca' Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.791 [INFO][4634] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.793 [INFO][4634] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.796 [INFO][4634] ipam.go 489: Trying affinity for 192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.797 [INFO][4634] ipam.go 155: Attempting to load block cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.799 [INFO][4634] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.799 [INFO][4634] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.64/26 handle="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.800 [INFO][4634] ipam.go 1682: Creating new handle: k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3 Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.802 [INFO][4634] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.64/26 handle="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.805 [INFO][4634] ipam.go 1216: Successfully claimed IPs: [192.168.78.68/26] block=192.168.78.64/26 handle="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.805 [INFO][4634] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.68/26] handle="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.805 [INFO][4634] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:46.866886 env[1475]: 2024-04-12 20:37:46.805 [INFO][4634] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.68/26] IPv6=[] ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" HandleID="k8s-pod-network.c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.867330 env[1475]: 2024-04-12 20:37:46.806 [INFO][4612] k8s.go 385: Populated endpoint ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"337e3327-836e-486a-b484-a95caf91ad42", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"", Pod:"coredns-5dd5756b68-jr58p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35b195f9884", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:46.867330 env[1475]: 2024-04-12 20:37:46.806 [INFO][4612] k8s.go 386: Calico CNI using IPs: [192.168.78.68/32] ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.867330 env[1475]: 2024-04-12 20:37:46.806 [INFO][4612] dataplane_linux.go 68: Setting the host side veth name to cali35b195f9884 ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.867330 env[1475]: 2024-04-12 20:37:46.861 [INFO][4612] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.867330 env[1475]: 2024-04-12 20:37:46.861 [INFO][4612] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"337e3327-836e-486a-b484-a95caf91ad42", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3", Pod:"coredns-5dd5756b68-jr58p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35b195f9884", MAC:"ba:cd:0c:28:46:d7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:46.867330 env[1475]: 2024-04-12 20:37:46.866 [INFO][4612] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3" Namespace="kube-system" Pod="coredns-5dd5756b68-jr58p" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:37:46.872509 env[1475]: time="2024-04-12T20:37:46.872449432Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:37:46.872509 env[1475]: time="2024-04-12T20:37:46.872472574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:37:46.872509 env[1475]: time="2024-04-12T20:37:46.872479600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:37:46.872630 env[1475]: time="2024-04-12T20:37:46.872541388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3 pid=4669 runtime=io.containerd.runc.v2 Apr 12 20:37:46.872000 audit[4670]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4670 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:37:46.872000 audit[4670]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7fff82c0e750 a2=0 a3=7fff82c0e73c items=0 ppid=3809 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.872000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:37:46.879260 systemd[1]: Started cri-containerd-c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3.scope. Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit: BPF prog-id=165 op=LOAD Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=4669 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643033356233346264336536333161396261633933353761626432 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=c items=0 ppid=4669 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643033356233346264336536333161396261633933353761626432 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit: BPF prog-id=166 op=LOAD Apr 12 20:37:46.884000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c000118e90 items=0 ppid=4669 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643033356233346264336536333161396261633933353761626432 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit: BPF prog-id=167 op=LOAD Apr 12 20:37:46.884000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c000118ed8 items=0 ppid=4669 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643033356233346264336536333161396261633933353761626432 Apr 12 20:37:46.884000 audit: BPF prog-id=167 op=UNLOAD Apr 12 20:37:46.884000 audit: BPF prog-id=166 op=UNLOAD Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { perfmon } for pid=4679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit[4679]: AVC avc: denied { bpf } for pid=4679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.884000 audit: BPF prog-id=168 op=LOAD Apr 12 20:37:46.884000 audit[4679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0001192e8 items=0 ppid=4669 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643033356233346264336536333161396261633933353761626432 Apr 12 20:37:46.901318 env[1475]: time="2024-04-12T20:37:46.901250246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-jr58p,Uid:337e3327-836e-486a-b484-a95caf91ad42,Namespace:kube-system,Attempt:1,} returns sandbox id \"c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3\"" Apr 12 20:37:46.902527 env[1475]: time="2024-04-12T20:37:46.902508077Z" level=info msg="CreateContainer within sandbox \"c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 20:37:46.906911 env[1475]: time="2024-04-12T20:37:46.906866853Z" level=info msg="CreateContainer within sandbox \"c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7d8cfc564547ed125fb01d19de8a745486d4a0e539b32a6258f0296439f42f11\"" Apr 12 20:37:46.907059 env[1475]: time="2024-04-12T20:37:46.907044818Z" level=info msg="StartContainer for \"7d8cfc564547ed125fb01d19de8a745486d4a0e539b32a6258f0296439f42f11\"" Apr 12 20:37:46.914200 systemd[1]: Started cri-containerd-7d8cfc564547ed125fb01d19de8a745486d4a0e539b32a6258f0296439f42f11.scope. Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit: BPF prog-id=169 op=LOAD Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4669 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386366633536343534376564313235666230316431396465386137 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4669 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386366633536343534376564313235666230316431396465386137 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit: BPF prog-id=170 op=LOAD Apr 12 20:37:46.920000 audit[4709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002efde0 items=0 ppid=4669 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386366633536343534376564313235666230316431396465386137 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit: BPF prog-id=171 op=LOAD Apr 12 20:37:46.920000 audit[4709]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002efe28 items=0 ppid=4669 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386366633536343534376564313235666230316431396465386137 Apr 12 20:37:46.920000 audit: BPF prog-id=171 op=UNLOAD Apr 12 20:37:46.920000 audit: BPF prog-id=170 op=UNLOAD Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { perfmon } for pid=4709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit[4709]: AVC avc: denied { bpf } for pid=4709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:46.920000 audit: BPF prog-id=172 op=LOAD Apr 12 20:37:46.920000 audit[4709]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b4238 items=0 ppid=4669 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:46.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386366633536343534376564313235666230316431396465386137 Apr 12 20:37:46.926697 env[1475]: time="2024-04-12T20:37:46.926674682Z" level=info msg="StartContainer for \"7d8cfc564547ed125fb01d19de8a745486d4a0e539b32a6258f0296439f42f11\" returns successfully" Apr 12 20:37:46.987534 env[1475]: time="2024-04-12T20:37:46.987450033Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:46.988394 env[1475]: time="2024-04-12T20:37:46.988348552Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:46.989614 env[1475]: time="2024-04-12T20:37:46.989573447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:46.991162 env[1475]: time="2024-04-12T20:37:46.991120928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:46.991535 env[1475]: time="2024-04-12T20:37:46.991491113Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 20:37:46.991803 env[1475]: time="2024-04-12T20:37:46.991787912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 20:37:46.995104 env[1475]: time="2024-04-12T20:37:46.995062730Z" level=info msg="CreateContainer within sandbox \"a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 20:37:47.000703 env[1475]: time="2024-04-12T20:37:47.000652798Z" level=info msg="CreateContainer within sandbox \"a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9748ffb128954c2e28b2b5c851a547d2fed615c90cdfbbc60c374cd3174c245c\"" Apr 12 20:37:47.000942 env[1475]: time="2024-04-12T20:37:47.000891522Z" level=info msg="StartContainer for \"9748ffb128954c2e28b2b5c851a547d2fed615c90cdfbbc60c374cd3174c245c\"" Apr 12 20:37:47.008357 systemd[1]: Started cri-containerd-9748ffb128954c2e28b2b5c851a547d2fed615c90cdfbbc60c374cd3174c245c.scope. Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.014000 audit: BPF prog-id=173 op=LOAD Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4182 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343866666231323839353463326532386232623563383531613534 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4182 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343866666231323839353463326532386232623563383531613534 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit: BPF prog-id=174 op=LOAD Apr 12 20:37:47.015000 audit[4759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032dd40 items=0 ppid=4182 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343866666231323839353463326532386232623563383531613534 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit: BPF prog-id=175 op=LOAD Apr 12 20:37:47.015000 audit[4759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032dd88 items=0 ppid=4182 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343866666231323839353463326532386232623563383531613534 Apr 12 20:37:47.015000 audit: BPF prog-id=175 op=UNLOAD Apr 12 20:37:47.015000 audit: BPF prog-id=174 op=UNLOAD Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { perfmon } for pid=4759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit[4759]: AVC avc: denied { bpf } for pid=4759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:47.015000 audit: BPF prog-id=176 op=LOAD Apr 12 20:37:47.015000 audit[4759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2198 items=0 ppid=4182 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343866666231323839353463326532386232623563383531613534 Apr 12 20:37:47.032298 env[1475]: time="2024-04-12T20:37:47.032271303Z" level=info msg="StartContainer for \"9748ffb128954c2e28b2b5c851a547d2fed615c90cdfbbc60c374cd3174c245c\" returns successfully" Apr 12 20:37:47.857291 kubelet[2559]: I0412 20:37:47.857218 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6888cd49dc-vtngz" podStartSLOduration=27.480407079 podCreationTimestamp="2024-04-12 20:37:17 +0000 UTC" firstStartedPulling="2024-04-12 20:37:43.614996164 +0000 UTC m=+43.963861864" lastFinishedPulling="2024-04-12 20:37:46.991680167 +0000 UTC m=+47.340545870" observedRunningTime="2024-04-12 20:37:47.856167422 +0000 UTC m=+48.205033234" watchObservedRunningTime="2024-04-12 20:37:47.857091085 +0000 UTC m=+48.205956839" Apr 12 20:37:47.875385 kubelet[2559]: I0412 20:37:47.875335 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-jr58p" podStartSLOduration=35.875261871 podCreationTimestamp="2024-04-12 20:37:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:37:47.87507735 +0000 UTC m=+48.223943094" watchObservedRunningTime="2024-04-12 20:37:47.875261871 +0000 UTC m=+48.224127612" Apr 12 20:37:47.884000 audit[4820]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:47.884000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcd83f8c80 a2=0 a3=7ffcd83f8c6c items=0 ppid=2840 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:47.893000 audit[4820]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:37:47.893000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcd83f8c80 a2=0 a3=7ffcd83f8c6c items=0 ppid=2840 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:47.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:37:48.245021 systemd-networkd[1315]: cali35b195f9884: Gained IPv6LL Apr 12 20:37:48.429649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2500375648.mount: Deactivated successfully. Apr 12 20:37:48.964341 env[1475]: time="2024-04-12T20:37:48.964316439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:48.964990 env[1475]: time="2024-04-12T20:37:48.964949112Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:48.965597 env[1475]: time="2024-04-12T20:37:48.965579683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:48.966318 env[1475]: time="2024-04-12T20:37:48.966304198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:48.966669 env[1475]: time="2024-04-12T20:37:48.966654341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 20:37:48.967480 env[1475]: time="2024-04-12T20:37:48.967465078Z" level=info msg="CreateContainer within sandbox \"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 20:37:48.973110 env[1475]: time="2024-04-12T20:37:48.973061829Z" level=info msg="CreateContainer within sandbox \"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a82a51e97c183b738ad3be213da7f754ba10ae4c8c112290a77a63740c9910be\"" Apr 12 20:37:48.973367 env[1475]: time="2024-04-12T20:37:48.973350971Z" level=info msg="StartContainer for \"a82a51e97c183b738ad3be213da7f754ba10ae4c8c112290a77a63740c9910be\"" Apr 12 20:37:48.984000 systemd[1]: Started cri-containerd-a82a51e97c183b738ad3be213da7f754ba10ae4c8c112290a77a63740c9910be.scope. Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.015604 kernel: kauditd_printk_skb: 419 callbacks suppressed Apr 12 20:37:49.015645 kernel: audit: type=1400 audit(1712954268.989:1308): avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c76b0 a2=3c a3=7f14d68f3128 items=0 ppid=4416 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:49.167388 kernel: audit: type=1300 audit(1712954268.989:1308): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c76b0 a2=3c a3=7f14d68f3128 items=0 ppid=4416 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:49.167465 kernel: audit: type=1327 audit(1712954268.989:1308): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326135316539376331383362373338616433626532313364613766 Apr 12 20:37:48.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326135316539376331383362373338616433626532313364613766 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.255783 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.374528 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.374607 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.434777 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.554904 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.616583 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.616608 kernel: audit: type=1400 audit(1712954268.989:1309): avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:48.989000 audit: BPF prog-id=177 op=LOAD Apr 12 20:37:48.989000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c79d8 a2=78 a3=c000237158 items=0 ppid=4416 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:48.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326135316539376331383362373338616433626532313364613766 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.075000 audit: BPF prog-id=178 op=LOAD Apr 12 20:37:49.075000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c7770 a2=78 a3=c0002371a8 items=0 ppid=4416 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:49.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326135316539376331383362373338616433626532313364613766 Apr 12 20:37:49.254000 audit: BPF prog-id=178 op=UNLOAD Apr 12 20:37:49.254000 audit: BPF prog-id=177 op=UNLOAD Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { perfmon } for pid=4833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit[4833]: AVC avc: denied { bpf } for pid=4833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:49.254000 audit: BPF prog-id=179 op=LOAD Apr 12 20:37:49.254000 audit[4833]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c7c30 a2=78 a3=c000237238 items=0 ppid=4416 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:49.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326135316539376331383362373338616433626532313364613766 Apr 12 20:37:49.679307 env[1475]: time="2024-04-12T20:37:49.678678033Z" level=info msg="StartContainer for \"a82a51e97c183b738ad3be213da7f754ba10ae4c8c112290a77a63740c9910be\" returns successfully" Apr 12 20:37:49.679390 env[1475]: time="2024-04-12T20:37:49.679378698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 20:37:51.808905 env[1475]: time="2024-04-12T20:37:51.808847258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:51.809495 env[1475]: time="2024-04-12T20:37:51.809453805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:51.810150 env[1475]: time="2024-04-12T20:37:51.810105426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:51.810792 env[1475]: time="2024-04-12T20:37:51.810722066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:37:51.811113 env[1475]: time="2024-04-12T20:37:51.811070777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 20:37:51.812159 env[1475]: time="2024-04-12T20:37:51.812143455Z" level=info msg="CreateContainer within sandbox \"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 20:37:51.817095 env[1475]: time="2024-04-12T20:37:51.817040592Z" level=info msg="CreateContainer within sandbox \"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a0363d940f53c7db82e89ff81083713a42500bbec82805da0d0b9bf0993c9f34\"" Apr 12 20:37:51.817330 env[1475]: time="2024-04-12T20:37:51.817288268Z" level=info msg="StartContainer for \"a0363d940f53c7db82e89ff81083713a42500bbec82805da0d0b9bf0993c9f34\"" Apr 12 20:37:51.826864 systemd[1]: Started cri-containerd-a0363d940f53c7db82e89ff81083713a42500bbec82805da0d0b9bf0993c9f34.scope. Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4f4f3592c8 items=0 ppid=4416 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:51.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333633643934306635336337646238326538396666383130383337 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit: BPF prog-id=180 op=LOAD Apr 12 20:37:51.833000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=4416 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:51.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333633643934306635336337646238326538396666383130383337 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit: BPF prog-id=181 op=LOAD Apr 12 20:37:51.833000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=4416 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:51.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333633643934306635336337646238326538396666383130383337 Apr 12 20:37:51.833000 audit: BPF prog-id=181 op=UNLOAD Apr 12 20:37:51.833000 audit: BPF prog-id=180 op=UNLOAD Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { perfmon } for pid=4884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit[4884]: AVC avc: denied { bpf } for pid=4884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:37:51.833000 audit: BPF prog-id=182 op=LOAD Apr 12 20:37:51.833000 audit[4884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=4416 pid=4884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:37:51.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333633643934306635336337646238326538396666383130383337 Apr 12 20:37:51.839728 env[1475]: time="2024-04-12T20:37:51.839703473Z" level=info msg="StartContainer for \"a0363d940f53c7db82e89ff81083713a42500bbec82805da0d0b9bf0993c9f34\" returns successfully" Apr 12 20:37:51.853174 kubelet[2559]: I0412 20:37:51.852975 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-wpt8s" podStartSLOduration=26.954907505 podCreationTimestamp="2024-04-12 20:37:17 +0000 UTC" firstStartedPulling="2024-04-12 20:37:43.913232471 +0000 UTC m=+44.262098171" lastFinishedPulling="2024-04-12 20:37:51.811263188 +0000 UTC m=+52.160128894" observedRunningTime="2024-04-12 20:37:51.852319996 +0000 UTC m=+52.201185699" watchObservedRunningTime="2024-04-12 20:37:51.852938228 +0000 UTC m=+52.201803930" Apr 12 20:37:52.760289 kubelet[2559]: I0412 20:37:52.757571 2559 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 20:37:52.760289 kubelet[2559]: I0412 20:37:52.757861 2559 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 20:37:55.290000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.333474 kernel: kauditd_printk_skb: 76 callbacks suppressed Apr 12 20:37:55.333560 kernel: audit: type=1400 audit(1712954275.290:1320): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.290000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002726140 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:55.422811 kernel: audit: type=1300 audit(1712954275.290:1320): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002726140 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:55.290000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:55.628216 kernel: audit: type=1327 audit(1712954275.290:1320): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:55.628250 kernel: audit: type=1400 audit(1712954275.291:1321): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.291000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.717687 kernel: audit: type=1300 audit(1712954275.291:1321): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebdb00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:55.291000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebdb00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:37:55.833033 kernel: audit: type=1327 audit(1712954275.291:1321): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:55.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:37:55.922803 kernel: audit: type=1400 audit(1712954275.597:1322): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:56.012648 kernel: audit: type=1300 audit(1712954275.597:1322): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0070080f0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0070080f0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:56.111723 kernel: audit: type=1327 audit(1712954275.597:1322): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:56.205816 kernel: audit: type=1400 audit(1712954275.597:1323): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c01254d9a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007008120 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006336ae0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007008180 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:37:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0099d8cc0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:37:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:37:59.703239 env[1475]: time="2024-04-12T20:37:59.703197043Z" level=info msg="StopPodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\"" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.724 [WARNING][4966] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0", GenerateName:"calico-kube-controllers-6888cd49dc-", Namespace:"calico-system", SelfLink:"", UID:"344d4fe4-a89a-47f1-9648-9a5f8f68118c", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6888cd49dc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321", Pod:"calico-kube-controllers-6888cd49dc-vtngz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califa298890a15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.724 [INFO][4966] k8s.go 585: Cleaning up netns ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.724 [INFO][4966] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" iface="eth0" netns="" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.724 [INFO][4966] k8s.go 592: Releasing IP address(es) ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.724 [INFO][4966] utils.go 188: Calico CNI releasing IP address ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.738 [INFO][4984] ipam_plugin.go 415: Releasing address using handleID ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.738 [INFO][4984] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.738 [INFO][4984] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.743 [WARNING][4984] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.743 [INFO][4984] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.745 [INFO][4984] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:59.746779 env[1475]: 2024-04-12 20:37:59.745 [INFO][4966] k8s.go 598: Teardown processing complete. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.747262 env[1475]: time="2024-04-12T20:37:59.746792992Z" level=info msg="TearDown network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" successfully" Apr 12 20:37:59.747262 env[1475]: time="2024-04-12T20:37:59.746814606Z" level=info msg="StopPodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" returns successfully" Apr 12 20:37:59.747262 env[1475]: time="2024-04-12T20:37:59.747129287Z" level=info msg="RemovePodSandbox for \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\"" Apr 12 20:37:59.747262 env[1475]: time="2024-04-12T20:37:59.747153780Z" level=info msg="Forcibly stopping sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\"" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.773 [WARNING][5014] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0", GenerateName:"calico-kube-controllers-6888cd49dc-", Namespace:"calico-system", SelfLink:"", UID:"344d4fe4-a89a-47f1-9648-9a5f8f68118c", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6888cd49dc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"a7138344ca602339438355521ff8e215271764e9409c8f27c6b325c870416321", Pod:"calico-kube-controllers-6888cd49dc-vtngz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.78.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califa298890a15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.773 [INFO][5014] k8s.go 585: Cleaning up netns ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.773 [INFO][5014] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" iface="eth0" netns="" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.773 [INFO][5014] k8s.go 592: Releasing IP address(es) ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.773 [INFO][5014] utils.go 188: Calico CNI releasing IP address ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.786 [INFO][5037] ipam_plugin.go 415: Releasing address using handleID ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.786 [INFO][5037] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.787 [INFO][5037] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.792 [WARNING][5037] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.792 [INFO][5037] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" HandleID="k8s-pod-network.bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--kube--controllers--6888cd49dc--vtngz-eth0" Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.793 [INFO][5037] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:59.795399 env[1475]: 2024-04-12 20:37:59.794 [INFO][5014] k8s.go 598: Teardown processing complete. ContainerID="bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6" Apr 12 20:37:59.795873 env[1475]: time="2024-04-12T20:37:59.795419808Z" level=info msg="TearDown network for sandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" successfully" Apr 12 20:37:59.797101 env[1475]: time="2024-04-12T20:37:59.797081914Z" level=info msg="RemovePodSandbox \"bf655f519caaf420495d8568bcf4fe3b35f6b21bc5b8323eabbd5f43c17379c6\" returns successfully" Apr 12 20:37:59.797483 env[1475]: time="2024-04-12T20:37:59.797466917Z" level=info msg="StopPodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\"" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.823 [WARNING][5070] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"69d8987b-1887-4dd8-b32f-19146ddf433e", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c", Pod:"csi-node-driver-wpt8s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11dfea7d7e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.824 [INFO][5070] k8s.go 585: Cleaning up netns ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.824 [INFO][5070] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" iface="eth0" netns="" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.824 [INFO][5070] k8s.go 592: Releasing IP address(es) ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.824 [INFO][5070] utils.go 188: Calico CNI releasing IP address ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.839 [INFO][5089] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.839 [INFO][5089] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.839 [INFO][5089] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.844 [WARNING][5089] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.844 [INFO][5089] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.846 [INFO][5089] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:59.848172 env[1475]: 2024-04-12 20:37:59.847 [INFO][5070] k8s.go 598: Teardown processing complete. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.848172 env[1475]: time="2024-04-12T20:37:59.848151180Z" level=info msg="TearDown network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" successfully" Apr 12 20:37:59.848172 env[1475]: time="2024-04-12T20:37:59.848176332Z" level=info msg="StopPodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" returns successfully" Apr 12 20:37:59.848760 env[1475]: time="2024-04-12T20:37:59.848542272Z" level=info msg="RemovePodSandbox for \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\"" Apr 12 20:37:59.848760 env[1475]: time="2024-04-12T20:37:59.848570142Z" level=info msg="Forcibly stopping sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\"" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.875 [WARNING][5118] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"69d8987b-1887-4dd8-b32f-19146ddf433e", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"6802a319957031098d63f50cb451b4fc6747ae7d14c312eee22c3dc7cbfccb2c", Pod:"csi-node-driver-wpt8s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.78.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11dfea7d7e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.875 [INFO][5118] k8s.go 585: Cleaning up netns ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.875 [INFO][5118] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" iface="eth0" netns="" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.875 [INFO][5118] k8s.go 592: Releasing IP address(es) ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.875 [INFO][5118] utils.go 188: Calico CNI releasing IP address ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.891 [INFO][5135] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.891 [INFO][5135] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.891 [INFO][5135] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.896 [WARNING][5135] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.897 [INFO][5135] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" HandleID="k8s-pod-network.7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Workload="ci--3510.3.3--a--413b88e4ca-k8s-csi--node--driver--wpt8s-eth0" Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.898 [INFO][5135] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:59.900281 env[1475]: 2024-04-12 20:37:59.899 [INFO][5118] k8s.go 598: Teardown processing complete. ContainerID="7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186" Apr 12 20:37:59.900825 env[1475]: time="2024-04-12T20:37:59.900304411Z" level=info msg="TearDown network for sandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" successfully" Apr 12 20:37:59.902089 env[1475]: time="2024-04-12T20:37:59.902044987Z" level=info msg="RemovePodSandbox \"7cc4b2c2c01895a5a70bb7dfd2ce6cee2ccbc52b60fcf3fd901aab13cd5ed186\" returns successfully" Apr 12 20:37:59.902415 env[1475]: time="2024-04-12T20:37:59.902360311Z" level=info msg="StopPodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\"" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.930 [WARNING][5164] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e80621d2-7452-4af7-a8ed-f8d47a158285", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406", Pod:"coredns-5dd5756b68-knt85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideb07c007cb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.930 [INFO][5164] k8s.go 585: Cleaning up netns ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.930 [INFO][5164] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" iface="eth0" netns="" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.930 [INFO][5164] k8s.go 592: Releasing IP address(es) ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.930 [INFO][5164] utils.go 188: Calico CNI releasing IP address ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.945 [INFO][5178] ipam_plugin.go 415: Releasing address using handleID ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.946 [INFO][5178] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.946 [INFO][5178] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.951 [WARNING][5178] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.951 [INFO][5178] ipam_plugin.go 443: Releasing address using workloadID ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.953 [INFO][5178] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:37:59.954950 env[1475]: 2024-04-12 20:37:59.953 [INFO][5164] k8s.go 598: Teardown processing complete. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:37:59.954950 env[1475]: time="2024-04-12T20:37:59.954928650Z" level=info msg="TearDown network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" successfully" Apr 12 20:37:59.955734 env[1475]: time="2024-04-12T20:37:59.954961027Z" level=info msg="StopPodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" returns successfully" Apr 12 20:37:59.955734 env[1475]: time="2024-04-12T20:37:59.955413534Z" level=info msg="RemovePodSandbox for \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\"" Apr 12 20:37:59.955734 env[1475]: time="2024-04-12T20:37:59.955454525Z" level=info msg="Forcibly stopping sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\"" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:37:59.984 [WARNING][5209] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e80621d2-7452-4af7-a8ed-f8d47a158285", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"3de19881b78f3df05e3a056199d78669712d9de07e6af291b31e438b84b0b406", Pod:"coredns-5dd5756b68-knt85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideb07c007cb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:37:59.985 [INFO][5209] k8s.go 585: Cleaning up netns ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:37:59.985 [INFO][5209] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" iface="eth0" netns="" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:37:59.985 [INFO][5209] k8s.go 592: Releasing IP address(es) ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:37:59.985 [INFO][5209] utils.go 188: Calico CNI releasing IP address ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.000 [INFO][5224] ipam_plugin.go 415: Releasing address using handleID ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.000 [INFO][5224] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.000 [INFO][5224] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.005 [WARNING][5224] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.005 [INFO][5224] ipam_plugin.go 443: Releasing address using workloadID ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" HandleID="k8s-pod-network.175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--knt85-eth0" Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.007 [INFO][5224] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:38:00.009048 env[1475]: 2024-04-12 20:38:00.008 [INFO][5209] k8s.go 598: Teardown processing complete. ContainerID="175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce" Apr 12 20:38:00.009048 env[1475]: time="2024-04-12T20:38:00.009026945Z" level=info msg="TearDown network for sandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" successfully" Apr 12 20:38:00.010788 env[1475]: time="2024-04-12T20:38:00.010765275Z" level=info msg="RemovePodSandbox \"175f3c9b348c7d35a3bd558986e5116fd8e75af95c0f9404d6c97d93decaa3ce\" returns successfully" Apr 12 20:38:00.011152 env[1475]: time="2024-04-12T20:38:00.011099991Z" level=info msg="StopPodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\"" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.038 [WARNING][5255] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"337e3327-836e-486a-b484-a95caf91ad42", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3", Pod:"coredns-5dd5756b68-jr58p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35b195f9884", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.038 [INFO][5255] k8s.go 585: Cleaning up netns ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.038 [INFO][5255] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" iface="eth0" netns="" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.038 [INFO][5255] k8s.go 592: Releasing IP address(es) ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.038 [INFO][5255] utils.go 188: Calico CNI releasing IP address ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.059 [INFO][5270] ipam_plugin.go 415: Releasing address using handleID ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.059 [INFO][5270] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.059 [INFO][5270] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.067 [WARNING][5270] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.067 [INFO][5270] ipam_plugin.go 443: Releasing address using workloadID ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.069 [INFO][5270] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:38:00.071409 env[1475]: 2024-04-12 20:38:00.070 [INFO][5255] k8s.go 598: Teardown processing complete. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.072138 env[1475]: time="2024-04-12T20:38:00.071409941Z" level=info msg="TearDown network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" successfully" Apr 12 20:38:00.072138 env[1475]: time="2024-04-12T20:38:00.071446631Z" level=info msg="StopPodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" returns successfully" Apr 12 20:38:00.072138 env[1475]: time="2024-04-12T20:38:00.071924041Z" level=info msg="RemovePodSandbox for \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\"" Apr 12 20:38:00.072138 env[1475]: time="2024-04-12T20:38:00.071966475Z" level=info msg="Forcibly stopping sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\"" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.110 [WARNING][5302] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"337e3327-836e-486a-b484-a95caf91ad42", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 37, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"c1d035b34bd3e631a9bac9357abd20abba4f6a37094411625f8a86cff61be0f3", Pod:"coredns-5dd5756b68-jr58p", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.78.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35b195f9884", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.110 [INFO][5302] k8s.go 585: Cleaning up netns ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.110 [INFO][5302] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" iface="eth0" netns="" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.110 [INFO][5302] k8s.go 592: Releasing IP address(es) ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.110 [INFO][5302] utils.go 188: Calico CNI releasing IP address ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.133 [INFO][5317] ipam_plugin.go 415: Releasing address using handleID ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.133 [INFO][5317] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.133 [INFO][5317] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.141 [WARNING][5317] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.141 [INFO][5317] ipam_plugin.go 443: Releasing address using workloadID ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" HandleID="k8s-pod-network.89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Workload="ci--3510.3.3--a--413b88e4ca-k8s-coredns--5dd5756b68--jr58p-eth0" Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.142 [INFO][5317] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:38:00.145422 env[1475]: 2024-04-12 20:38:00.144 [INFO][5302] k8s.go 598: Teardown processing complete. ContainerID="89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e" Apr 12 20:38:00.146199 env[1475]: time="2024-04-12T20:38:00.145451926Z" level=info msg="TearDown network for sandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" successfully" Apr 12 20:38:00.147892 env[1475]: time="2024-04-12T20:38:00.147860894Z" level=info msg="RemovePodSandbox \"89d5dab33387ad0dae3d61312ef48233d213a1a684860b0c9d3f5abde459f14e\" returns successfully" Apr 12 20:38:00.308000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.338071 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:38:00.338151 kernel: audit: type=1400 audit(1712954280.308:1328): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.308000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002592ca0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.551098 kernel: audit: type=1300 audit(1712954280.308:1328): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002592ca0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.551172 kernel: audit: type=1327 audit(1712954280.308:1328): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:00.308000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:00.645183 kernel: audit: type=1400 audit(1712954280.310:1329): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.310000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.735018 kernel: audit: type=1300 audit(1712954280.310:1329): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002727000 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.310000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002727000 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.855326 kernel: audit: type=1327 audit(1712954280.310:1329): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:00.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:00.948476 kernel: audit: type=1400 audit(1712954280.311:1330): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.311000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:01.038462 kernel: audit: type=1300 audit(1712954280.311:1330): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002592e40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.311000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002592e40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:01.252035 kernel: audit: type=1327 audit(1712954280.311:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:01.252086 kernel: audit: type=1400 audit(1712954280.311:1331): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.311000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:00.311000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d1cd80 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:00.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:02.541000 audit[5358]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:02.541000 audit[5358]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffce78ad1c0 a2=0 a3=7ffce78ad1ac items=0 ppid=2840 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:02.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:02.544458 kubelet[2559]: I0412 20:38:02.544429 2559 topology_manager.go:215] "Topology Admit Handler" podUID="20ebce4d-71b9-49ad-8d50-8419ad26f358" podNamespace="calico-apiserver" podName="calico-apiserver-6c8d748855-mwcsc" Apr 12 20:38:02.548485 kubelet[2559]: I0412 20:38:02.548462 2559 topology_manager.go:215] "Topology Admit Handler" podUID="5dcea512-1348-4198-9f32-a0f2ef5a1504" podNamespace="calico-apiserver" podName="calico-apiserver-6c8d748855-cp48c" Apr 12 20:38:02.550500 systemd[1]: Created slice kubepods-besteffort-pod20ebce4d_71b9_49ad_8d50_8419ad26f358.slice. Apr 12 20:38:02.553973 systemd[1]: Created slice kubepods-besteffort-pod5dcea512_1348_4198_9f32_a0f2ef5a1504.slice. Apr 12 20:38:02.542000 audit[5358]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:02.542000 audit[5358]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffce78ad1c0 a2=0 a3=7ffce78ad1ac items=0 ppid=2840 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:02.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:02.558000 audit[5360]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:02.558000 audit[5360]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd759185d0 a2=0 a3=7ffd759185bc items=0 ppid=2840 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:02.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:02.572000 audit[5360]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:02.572000 audit[5360]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd759185d0 a2=0 a3=7ffd759185bc items=0 ppid=2840 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:02.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:02.650494 kubelet[2559]: I0412 20:38:02.650436 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5dcea512-1348-4198-9f32-a0f2ef5a1504-calico-apiserver-certs\") pod \"calico-apiserver-6c8d748855-cp48c\" (UID: \"5dcea512-1348-4198-9f32-a0f2ef5a1504\") " pod="calico-apiserver/calico-apiserver-6c8d748855-cp48c" Apr 12 20:38:02.650818 kubelet[2559]: I0412 20:38:02.650562 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qxzkb\" (UniqueName: \"kubernetes.io/projected/20ebce4d-71b9-49ad-8d50-8419ad26f358-kube-api-access-qxzkb\") pod \"calico-apiserver-6c8d748855-mwcsc\" (UID: \"20ebce4d-71b9-49ad-8d50-8419ad26f358\") " pod="calico-apiserver/calico-apiserver-6c8d748855-mwcsc" Apr 12 20:38:02.650974 kubelet[2559]: I0412 20:38:02.650864 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-629nb\" (UniqueName: \"kubernetes.io/projected/5dcea512-1348-4198-9f32-a0f2ef5a1504-kube-api-access-629nb\") pod \"calico-apiserver-6c8d748855-cp48c\" (UID: \"5dcea512-1348-4198-9f32-a0f2ef5a1504\") " pod="calico-apiserver/calico-apiserver-6c8d748855-cp48c" Apr 12 20:38:02.651096 kubelet[2559]: I0412 20:38:02.651049 2559 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/20ebce4d-71b9-49ad-8d50-8419ad26f358-calico-apiserver-certs\") pod \"calico-apiserver-6c8d748855-mwcsc\" (UID: \"20ebce4d-71b9-49ad-8d50-8419ad26f358\") " pod="calico-apiserver/calico-apiserver-6c8d748855-mwcsc" Apr 12 20:38:02.751903 kubelet[2559]: E0412 20:38:02.751810 2559 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 20:38:02.751903 kubelet[2559]: E0412 20:38:02.751842 2559 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 20:38:02.752443 kubelet[2559]: E0412 20:38:02.752004 2559 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/20ebce4d-71b9-49ad-8d50-8419ad26f358-calico-apiserver-certs podName:20ebce4d-71b9-49ad-8d50-8419ad26f358 nodeName:}" failed. No retries permitted until 2024-04-12 20:38:03.251954202 +0000 UTC m=+63.600819961 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/20ebce4d-71b9-49ad-8d50-8419ad26f358-calico-apiserver-certs") pod "calico-apiserver-6c8d748855-mwcsc" (UID: "20ebce4d-71b9-49ad-8d50-8419ad26f358") : secret "calico-apiserver-certs" not found Apr 12 20:38:02.752443 kubelet[2559]: E0412 20:38:02.752055 2559 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5dcea512-1348-4198-9f32-a0f2ef5a1504-calico-apiserver-certs podName:5dcea512-1348-4198-9f32-a0f2ef5a1504 nodeName:}" failed. No retries permitted until 2024-04-12 20:38:03.252027925 +0000 UTC m=+63.600893679 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5dcea512-1348-4198-9f32-a0f2ef5a1504-calico-apiserver-certs") pod "calico-apiserver-6c8d748855-cp48c" (UID: "5dcea512-1348-4198-9f32-a0f2ef5a1504") : secret "calico-apiserver-certs" not found Apr 12 20:38:03.453677 env[1475]: time="2024-04-12T20:38:03.453544448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c8d748855-mwcsc,Uid:20ebce4d-71b9-49ad-8d50-8419ad26f358,Namespace:calico-apiserver,Attempt:0,}" Apr 12 20:38:03.456914 env[1475]: time="2024-04-12T20:38:03.456791544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c8d748855-cp48c,Uid:5dcea512-1348-4198-9f32-a0f2ef5a1504,Namespace:calico-apiserver,Attempt:0,}" Apr 12 20:38:03.600953 systemd-networkd[1315]: califb0abc92a66: Link UP Apr 12 20:38:03.667891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:38:03.667979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb0abc92a66: link becomes ready Apr 12 20:38:03.667982 systemd-networkd[1315]: califb0abc92a66: Gained carrier Apr 12 20:38:03.668761 systemd-networkd[1315]: cali14fb0e4b3f9: Link UP Apr 12 20:38:03.696738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14fb0e4b3f9: link becomes ready Apr 12 20:38:03.696921 systemd-networkd[1315]: cali14fb0e4b3f9: Gained carrier Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.537 [INFO][5365] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0 calico-apiserver-6c8d748855- calico-apiserver 20ebce4d-71b9-49ad-8d50-8419ad26f358 818 0 2024-04-12 20:38:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6c8d748855 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-413b88e4ca calico-apiserver-6c8d748855-mwcsc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califb0abc92a66 [] []}} ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.537 [INFO][5365] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.556 [INFO][5411] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" HandleID="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.563 [INFO][5411] ipam_plugin.go 268: Auto assigning IP ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" HandleID="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000340c60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-413b88e4ca", "pod":"calico-apiserver-6c8d748855-mwcsc", "timestamp":"2024-04-12 20:38:03.55633943 +0000 UTC"}, Hostname:"ci-3510.3.3-a-413b88e4ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.563 [INFO][5411] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.563 [INFO][5411] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.563 [INFO][5411] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-413b88e4ca' Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.564 [INFO][5411] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.568 [INFO][5411] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.571 [INFO][5411] ipam.go 489: Trying affinity for 192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.572 [INFO][5411] ipam.go 155: Attempting to load block cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.574 [INFO][5411] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.574 [INFO][5411] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.64/26 handle="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.575 [INFO][5411] ipam.go 1682: Creating new handle: k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4 Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.579 [INFO][5411] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.64/26 handle="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.592 [INFO][5411] ipam.go 1216: Successfully claimed IPs: [192.168.78.69/26] block=192.168.78.64/26 handle="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.593 [INFO][5411] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.69/26] handle="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.593 [INFO][5411] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:38:03.698757 env[1475]: 2024-04-12 20:38:03.593 [INFO][5411] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.69/26] IPv6=[] ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" HandleID="k8s-pod-network.265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.699240 env[1475]: 2024-04-12 20:38:03.596 [INFO][5365] k8s.go 385: Populated endpoint ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0", GenerateName:"calico-apiserver-6c8d748855-", Namespace:"calico-apiserver", SelfLink:"", UID:"20ebce4d-71b9-49ad-8d50-8419ad26f358", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 38, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c8d748855", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"", Pod:"calico-apiserver-6c8d748855-mwcsc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.78.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califb0abc92a66", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:03.699240 env[1475]: 2024-04-12 20:38:03.596 [INFO][5365] k8s.go 386: Calico CNI using IPs: [192.168.78.69/32] ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.699240 env[1475]: 2024-04-12 20:38:03.597 [INFO][5365] dataplane_linux.go 68: Setting the host side veth name to califb0abc92a66 ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.699240 env[1475]: 2024-04-12 20:38:03.667 [INFO][5365] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.699240 env[1475]: 2024-04-12 20:38:03.668 [INFO][5365] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0", GenerateName:"calico-apiserver-6c8d748855-", Namespace:"calico-apiserver", SelfLink:"", UID:"20ebce4d-71b9-49ad-8d50-8419ad26f358", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 38, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c8d748855", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4", Pod:"calico-apiserver-6c8d748855-mwcsc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.78.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califb0abc92a66", MAC:"2a:cf:d3:5e:87:cc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:03.699240 env[1475]: 2024-04-12 20:38:03.697 [INFO][5365] k8s.go 498: Wrote updated endpoint to datastore ContainerID="265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-mwcsc" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--mwcsc-eth0" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.539 [INFO][5377] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0 calico-apiserver-6c8d748855- calico-apiserver 5dcea512-1348-4198-9f32-a0f2ef5a1504 820 0 2024-04-12 20:38:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6c8d748855 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-413b88e4ca calico-apiserver-6c8d748855-cp48c eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali14fb0e4b3f9 [] []}} ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.539 [INFO][5377] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.556 [INFO][5416] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" HandleID="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.564 [INFO][5416] ipam_plugin.go 268: Auto assigning IP ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" HandleID="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0006b9090), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-413b88e4ca", "pod":"calico-apiserver-6c8d748855-cp48c", "timestamp":"2024-04-12 20:38:03.55676867 +0000 UTC"}, Hostname:"ci-3510.3.3-a-413b88e4ca", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.564 [INFO][5416] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.593 [INFO][5416] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.593 [INFO][5416] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-413b88e4ca' Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.597 [INFO][5416] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.607 [INFO][5416] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.617 [INFO][5416] ipam.go 489: Trying affinity for 192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.621 [INFO][5416] ipam.go 155: Attempting to load block cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.626 [INFO][5416] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.78.64/26 host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.626 [INFO][5416] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.78.64/26 handle="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.629 [INFO][5416] ipam.go 1682: Creating new handle: k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84 Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.633 [INFO][5416] ipam.go 1203: Writing block in order to claim IPs block=192.168.78.64/26 handle="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.648 [INFO][5416] ipam.go 1216: Successfully claimed IPs: [192.168.78.70/26] block=192.168.78.64/26 handle="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.648 [INFO][5416] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.78.70/26] handle="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" host="ci-3510.3.3-a-413b88e4ca" Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.648 [INFO][5416] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:38:03.703518 env[1475]: 2024-04-12 20:38:03.648 [INFO][5416] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.78.70/26] IPv6=[] ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" HandleID="k8s-pod-network.b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Workload="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.704267 env[1475]: 2024-04-12 20:38:03.650 [INFO][5377] k8s.go 385: Populated endpoint ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0", GenerateName:"calico-apiserver-6c8d748855-", Namespace:"calico-apiserver", SelfLink:"", UID:"5dcea512-1348-4198-9f32-a0f2ef5a1504", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 38, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c8d748855", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"", Pod:"calico-apiserver-6c8d748855-cp48c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.78.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14fb0e4b3f9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:03.704267 env[1475]: 2024-04-12 20:38:03.650 [INFO][5377] k8s.go 386: Calico CNI using IPs: [192.168.78.70/32] ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.704267 env[1475]: 2024-04-12 20:38:03.650 [INFO][5377] dataplane_linux.go 68: Setting the host side veth name to cali14fb0e4b3f9 ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.704267 env[1475]: 2024-04-12 20:38:03.696 [INFO][5377] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.704267 env[1475]: 2024-04-12 20:38:03.697 [INFO][5377] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0", GenerateName:"calico-apiserver-6c8d748855-", Namespace:"calico-apiserver", SelfLink:"", UID:"5dcea512-1348-4198-9f32-a0f2ef5a1504", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 38, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c8d748855", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-413b88e4ca", ContainerID:"b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84", Pod:"calico-apiserver-6c8d748855-cp48c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.78.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14fb0e4b3f9", MAC:"a2:ca:83:ca:c4:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:38:03.704267 env[1475]: 2024-04-12 20:38:03.702 [INFO][5377] k8s.go 498: Wrote updated endpoint to datastore ContainerID="b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84" Namespace="calico-apiserver" Pod="calico-apiserver-6c8d748855-cp48c" WorkloadEndpoint="ci--3510.3.3--a--413b88e4ca-k8s-calico--apiserver--6c8d748855--cp48c-eth0" Apr 12 20:38:03.704682 env[1475]: time="2024-04-12T20:38:03.704648589Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:38:03.704682 env[1475]: time="2024-04-12T20:38:03.704672527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:38:03.704765 env[1475]: time="2024-04-12T20:38:03.704679254Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:38:03.704798 env[1475]: time="2024-04-12T20:38:03.704783275Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4 pid=5474 runtime=io.containerd.runc.v2 Apr 12 20:38:03.706000 audit[5500]: NETFILTER_CFG table=filter:115 family=2 entries=65 op=nft_register_chain pid=5500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:38:03.706000 audit[5500]: SYSCALL arch=c000003e syscall=46 success=yes exit=32992 a0=3 a1=7ffe0879bdc0 a2=0 a3=7ffe0879bdac items=0 ppid=3809 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:38:03.709033 env[1475]: time="2024-04-12T20:38:03.708996746Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:38:03.709033 env[1475]: time="2024-04-12T20:38:03.709021490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:38:03.709033 env[1475]: time="2024-04-12T20:38:03.709028584Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:38:03.709144 env[1475]: time="2024-04-12T20:38:03.709103100Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84 pid=5508 runtime=io.containerd.runc.v2 Apr 12 20:38:03.710314 systemd[1]: Started cri-containerd-265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4.scope. Apr 12 20:38:03.714838 systemd[1]: Started cri-containerd-b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84.scope. Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit: BPF prog-id=183 op=LOAD Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5474 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356538326537313561373739633735393634306264616137393133 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5474 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356538326537313561373739633735393634306264616137393133 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit: BPF prog-id=184 op=LOAD Apr 12 20:38:03.715000 audit[5493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030a8d0 items=0 ppid=5474 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356538326537313561373739633735393634306264616137393133 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit: BPF prog-id=185 op=LOAD Apr 12 20:38:03.715000 audit[5493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030a918 items=0 ppid=5474 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356538326537313561373739633735393634306264616137393133 Apr 12 20:38:03.715000 audit: BPF prog-id=185 op=UNLOAD Apr 12 20:38:03.715000 audit: BPF prog-id=184 op=UNLOAD Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { perfmon } for pid=5493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit[5493]: AVC avc: denied { bpf } for pid=5493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.715000 audit: BPF prog-id=186 op=LOAD Apr 12 20:38:03.715000 audit[5493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030ad28 items=0 ppid=5474 pid=5493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236356538326537313561373739633735393634306264616137393133 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit: BPF prog-id=187 op=LOAD Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5508 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230343866353462633366656164386164353236316430376432383061 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5508 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230343866353462633366656164386164353236316430376432383061 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit: BPF prog-id=188 op=LOAD Apr 12 20:38:03.719000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304c10 items=0 ppid=5508 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230343866353462633366656164386164353236316430376432383061 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit: BPF prog-id=189 op=LOAD Apr 12 20:38:03.719000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304c58 items=0 ppid=5508 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230343866353462633366656164386164353236316430376432383061 Apr 12 20:38:03.719000 audit: BPF prog-id=189 op=UNLOAD Apr 12 20:38:03.719000 audit: BPF prog-id=188 op=UNLOAD Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:03.719000 audit: BPF prog-id=190 op=LOAD Apr 12 20:38:03.719000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000305068 items=0 ppid=5508 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230343866353462633366656164386164353236316430376432383061 Apr 12 20:38:03.720000 audit[5544]: NETFILTER_CFG table=filter:116 family=2 entries=52 op=nft_register_chain pid=5544 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:38:03.720000 audit[5544]: SYSCALL arch=c000003e syscall=46 success=yes exit=26728 a0=3 a1=7ffc035df360 a2=0 a3=7ffc035df34c items=0 ppid=3809 pid=5544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:03.720000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:38:03.734267 env[1475]: time="2024-04-12T20:38:03.734231109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c8d748855-mwcsc,Uid:20ebce4d-71b9-49ad-8d50-8419ad26f358,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4\"" Apr 12 20:38:03.734929 env[1475]: time="2024-04-12T20:38:03.734913415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 20:38:03.737459 env[1475]: time="2024-04-12T20:38:03.737439005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c8d748855-cp48c,Uid:5dcea512-1348-4198-9f32-a0f2ef5a1504,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84\"" Apr 12 20:38:04.948034 systemd-networkd[1315]: califb0abc92a66: Gained IPv6LL Apr 12 20:38:05.075992 systemd-networkd[1315]: cali14fb0e4b3f9: Gained IPv6LL Apr 12 20:38:05.400236 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2636266669.mount: Deactivated successfully. Apr 12 20:38:07.122392 env[1475]: time="2024-04-12T20:38:07.122250531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.175960 env[1475]: time="2024-04-12T20:38:07.175845925Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.284986 env[1475]: time="2024-04-12T20:38:07.284847914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.306194 env[1475]: time="2024-04-12T20:38:07.306055312Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.308409 env[1475]: time="2024-04-12T20:38:07.308286003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 20:38:07.309624 env[1475]: time="2024-04-12T20:38:07.309526394Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 20:38:07.312684 env[1475]: time="2024-04-12T20:38:07.312572976Z" level=info msg="CreateContainer within sandbox \"265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 20:38:07.460359 env[1475]: time="2024-04-12T20:38:07.460222359Z" level=info msg="CreateContainer within sandbox \"265e82e715a779c759640bdaa7913aa2ab8085aad662a60fe03615c0d9c7c8d4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7cfbac0159ea5783f3c646d6a1f657f6c60822b18e248b231ed9306bec32b77e\"" Apr 12 20:38:07.461434 env[1475]: time="2024-04-12T20:38:07.461307807Z" level=info msg="StartContainer for \"7cfbac0159ea5783f3c646d6a1f657f6c60822b18e248b231ed9306bec32b77e\"" Apr 12 20:38:07.503822 systemd[1]: Started cri-containerd-7cfbac0159ea5783f3c646d6a1f657f6c60822b18e248b231ed9306bec32b77e.scope. Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.541689 kernel: kauditd_printk_skb: 134 callbacks suppressed Apr 12 20:38:07.541743 kernel: audit: type=1400 audit(1712954287.514:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.665009 kernel: audit: type=1400 audit(1712954287.514:1375): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.665068 kernel: audit: type=1400 audit(1712954287.514:1376): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.747334 env[1475]: time="2024-04-12T20:38:07.747308467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.747826 env[1475]: time="2024-04-12T20:38:07.747814449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.748485 env[1475]: time="2024-04-12T20:38:07.748462284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.749534 env[1475]: time="2024-04-12T20:38:07.749488134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:38:07.749662 env[1475]: time="2024-04-12T20:38:07.749650375Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 20:38:07.750583 env[1475]: time="2024-04-12T20:38:07.750568505Z" level=info msg="CreateContainer within sandbox \"b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 20:38:07.790649 kernel: audit: type=1400 audit(1712954287.514:1377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.790733 kernel: audit: type=1400 audit(1712954287.514:1378): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.852851 kernel: audit: type=1400 audit(1712954287.514:1379): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.854467 env[1475]: time="2024-04-12T20:38:07.854412203Z" level=info msg="CreateContainer within sandbox \"b048f54bc3fead8ad5261d07d280a7da3b2a0de09bd8a8f0d831448aff35dc84\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2e2331971a4e9028b224aedbdd7075b9098c4b161153685cbc485cb85b96bbed\"" Apr 12 20:38:07.854774 env[1475]: time="2024-04-12T20:38:07.854724360Z" level=info msg="StartContainer for \"2e2331971a4e9028b224aedbdd7075b9098c4b161153685cbc485cb85b96bbed\"" Apr 12 20:38:07.862290 systemd[1]: Started cri-containerd-2e2331971a4e9028b224aedbdd7075b9098c4b161153685cbc485cb85b96bbed.scope. Apr 12 20:38:07.915185 kernel: audit: type=1400 audit(1712954287.514:1380): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.977459 kernel: audit: type=1400 audit(1712954287.514:1381): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.039734 kernel: audit: type=1400 audit(1712954287.514:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.101651 kernel: audit: type=1400 audit(1712954287.601:1383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit: BPF prog-id=191 op=LOAD Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5474 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666261633031353965613537383366336336343664366131663635 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5474 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666261633031353965613537383366336336343664366131663635 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.601000 audit: BPF prog-id=192 op=LOAD Apr 12 20:38:07.601000 audit[5568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ddc20 items=0 ppid=5474 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666261633031353965613537383366336336343664366131663635 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.725000 audit: BPF prog-id=193 op=LOAD Apr 12 20:38:07.725000 audit[5568]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ddc68 items=0 ppid=5474 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:07.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666261633031353965613537383366336336343664366131663635 Apr 12 20:38:07.851000 audit: BPF prog-id=193 op=UNLOAD Apr 12 20:38:07.851000 audit: BPF prog-id=192 op=UNLOAD Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { perfmon } for pid=5568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit[5568]: AVC avc: denied { bpf } for pid=5568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:07.851000 audit: BPF prog-id=194 op=LOAD Apr 12 20:38:07.851000 audit[5568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a8078 items=0 ppid=5474 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:07.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666261633031353965613537383366336336343664366131663635 Apr 12 20:38:08.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.099000 audit: BPF prog-id=195 op=LOAD Apr 12 20:38:08.100000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.100000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=5508 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323333313937316134653930323862323234616564626464373037 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=5508 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323333313937316134653930323862323234616564626464373037 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.161000 audit: BPF prog-id=196 op=LOAD Apr 12 20:38:08.161000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000242750 items=0 ppid=5508 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323333313937316134653930323862323234616564626464373037 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit: BPF prog-id=197 op=LOAD Apr 12 20:38:08.162000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000242798 items=0 ppid=5508 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323333313937316134653930323862323234616564626464373037 Apr 12 20:38:08.162000 audit: BPF prog-id=197 op=UNLOAD Apr 12 20:38:08.162000 audit: BPF prog-id=196 op=UNLOAD Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:38:08.162000 audit: BPF prog-id=198 op=LOAD Apr 12 20:38:08.162000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000242ba8 items=0 ppid=5508 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323333313937316134653930323862323234616564626464373037 Apr 12 20:38:08.179639 env[1475]: time="2024-04-12T20:38:08.179613924Z" level=info msg="StartContainer for \"7cfbac0159ea5783f3c646d6a1f657f6c60822b18e248b231ed9306bec32b77e\" returns successfully" Apr 12 20:38:08.179895 env[1475]: time="2024-04-12T20:38:08.179613959Z" level=info msg="StartContainer for \"2e2331971a4e9028b224aedbdd7075b9098c4b161153685cbc485cb85b96bbed\" returns successfully" Apr 12 20:38:08.526000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:38:08.526000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097c160 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:38:08.526000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:38:08.589000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:38:08.589000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00169ea80 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:38:08.589000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:38:08.918026 kubelet[2559]: I0412 20:38:08.917956 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6c8d748855-cp48c" podStartSLOduration=2.906119878 podCreationTimestamp="2024-04-12 20:38:02 +0000 UTC" firstStartedPulling="2024-04-12 20:38:03.737970309 +0000 UTC m=+64.086836012" lastFinishedPulling="2024-04-12 20:38:07.749774573 +0000 UTC m=+68.098640275" observedRunningTime="2024-04-12 20:38:08.917925218 +0000 UTC m=+69.266790927" watchObservedRunningTime="2024-04-12 20:38:08.917924141 +0000 UTC m=+69.266789840" Apr 12 20:38:08.923343 kubelet[2559]: I0412 20:38:08.923322 2559 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6c8d748855-mwcsc" podStartSLOduration=3.349138509 podCreationTimestamp="2024-04-12 20:38:02 +0000 UTC" firstStartedPulling="2024-04-12 20:38:03.734777965 +0000 UTC m=+64.083643667" lastFinishedPulling="2024-04-12 20:38:07.308936013 +0000 UTC m=+67.657801786" observedRunningTime="2024-04-12 20:38:08.922884917 +0000 UTC m=+69.271750621" watchObservedRunningTime="2024-04-12 20:38:08.923296628 +0000 UTC m=+69.272162328" Apr 12 20:38:08.922000 audit[5668]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:08.922000 audit[5668]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcddc80dd0 a2=0 a3=7ffcddc80dbc items=0 ppid=2840 pid=5668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:08.922000 audit[5668]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:08.922000 audit[5668]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcddc80dd0 a2=0 a3=7ffcddc80dbc items=0 ppid=2840 pid=5668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:08.940000 audit[5670]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:08.940000 audit[5670]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffff1259a60 a2=0 a3=7ffff1259a4c items=0 ppid=2840 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:08.947000 audit[5670]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:08.947000 audit[5670]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffff1259a60 a2=0 a3=7ffff1259a4c items=0 ppid=2840 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:08.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.501000 audit[5786]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=5786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:33.527809 kernel: kauditd_printk_skb: 122 callbacks suppressed Apr 12 20:38:33.527882 kernel: audit: type=1325 audit(1712954313.501:1416): table=filter:121 family=2 entries=9 op=nft_register_rule pid=5786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:33.501000 audit[5786]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2088d7c0 a2=0 a3=7ffe2088d7ac items=0 ppid=2840 pid=5786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:33.680382 kernel: audit: type=1300 audit(1712954313.501:1416): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2088d7c0 a2=0 a3=7ffe2088d7ac items=0 ppid=2840 pid=5786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:33.680417 kernel: audit: type=1327 audit(1712954313.501:1416): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.501000 audit[5786]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=5786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:33.501000 audit[5786]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe2088d7c0 a2=0 a3=7ffe2088d7ac items=0 ppid=2840 pid=5786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:33.895653 kernel: audit: type=1325 audit(1712954313.501:1417): table=nat:122 family=2 entries=27 op=nft_register_chain pid=5786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:33.895701 kernel: audit: type=1300 audit(1712954313.501:1417): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe2088d7c0 a2=0 a3=7ffe2088d7ac items=0 ppid=2840 pid=5786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:33.895721 kernel: audit: type=1327 audit(1712954313.501:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.745000 audit[5788]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:33.745000 audit[5788]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff5125d5d0 a2=0 a3=7fff5125d5bc items=0 ppid=2840 pid=5788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:34.105583 kernel: audit: type=1325 audit(1712954313.745:1418): table=filter:123 family=2 entries=8 op=nft_register_rule pid=5788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:34.105630 kernel: audit: type=1300 audit(1712954313.745:1418): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff5125d5d0 a2=0 a3=7fff5125d5bc items=0 ppid=2840 pid=5788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:34.105647 kernel: audit: type=1327 audit(1712954313.745:1418): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:33.952000 audit[5788]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=5788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:34.221749 kernel: audit: type=1325 audit(1712954313.952:1419): table=nat:124 family=2 entries=34 op=nft_register_chain pid=5788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:38:33.952000 audit[5788]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff5125d5d0 a2=0 a3=7fff5125d5bc items=0 ppid=2840 pid=5788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:38:33.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:38:55.291000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.319825 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:38:55.319877 kernel: audit: type=1400 audit(1712954335.291:1420): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.291000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006ae8c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:55.534426 kernel: audit: type=1300 audit(1712954335.291:1420): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006ae8c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:55.534502 kernel: audit: type=1327 audit(1712954335.291:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:55.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:55.629593 kernel: audit: type=1400 audit(1712954335.291:1421): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.291000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.720954 kernel: audit: type=1300 audit(1712954335.291:1421): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cdc690 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:55.291000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cdc690 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:38:55.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:55.934641 kernel: audit: type=1327 audit(1712954335.291:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:38:55.934681 kernel: audit: type=1400 audit(1712954335.598:1422): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011cf65a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:56.125796 kernel: audit: type=1300 audit(1712954335.598:1422): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011cf65a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:56.125828 kernel: audit: type=1327 audit(1712954335.598:1422): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:38:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:38:56.219126 kernel: audit: type=1400 audit(1712954335.598:1423): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011cf6600 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:38:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00dcd6560 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:38:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00edf5740 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:38:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011cf6690 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:38:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:38:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00dcd6580 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:38:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:00.311000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:00.355279 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:39:00.355356 kernel: audit: type=1400 audit(1712954340.311:1428): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:00.311000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000a9da0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:00.566047 kernel: audit: type=1300 audit(1712954340.311:1428): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000a9da0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:00.566134 kernel: audit: type=1327 audit(1712954340.311:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:00.566151 kernel: audit: type=1400 audit(1712954340.312:1429): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:00.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:00.312000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:00.312000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001110320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:00.870595 kernel: audit: type=1300 audit(1712954340.312:1429): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001110320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:00.870654 kernel: audit: type=1327 audit(1712954340.312:1429): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:00.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:00.313000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:01.054588 kernel: audit: type=1400 audit(1712954340.313:1430): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:01.054665 kernel: audit: type=1300 audit(1712954340.313:1430): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db04e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:00.313000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db04e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:01.175100 kernel: audit: type=1327 audit(1712954340.313:1430): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:00.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:01.268390 kernel: audit: type=1400 audit(1712954340.313:1431): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:00.313000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:00.313000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001386b00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:00.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:08.529000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:39:08.557175 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:39:08.557228 kernel: audit: type=1400 audit(1712954348.529:1432): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:39:08.529000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f96b20 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:39:08.747467 kernel: audit: type=1300 audit(1712954348.529:1432): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f96b20 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:39:08.747502 kernel: audit: type=1327 audit(1712954348.529:1432): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:39:08.529000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:39:08.840499 kernel: audit: type=1400 audit(1712954348.590:1433): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:39:08.590000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:39:08.590000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09ac0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:39:09.033841 kernel: audit: type=1300 audit(1712954348.590:1433): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09ac0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:39:09.033881 kernel: audit: type=1327 audit(1712954348.590:1433): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:39:08.590000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:39:41.533511 update_engine[1465]: I0412 20:39:41.533345 1465 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 20:39:41.533511 update_engine[1465]: I0412 20:39:41.533424 1465 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 20:39:41.534687 update_engine[1465]: I0412 20:39:41.534209 1465 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 20:39:41.535235 update_engine[1465]: I0412 20:39:41.535161 1465 omaha_request_params.cc:62] Current group set to lts Apr 12 20:39:41.535482 update_engine[1465]: I0412 20:39:41.535450 1465 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 20:39:41.535482 update_engine[1465]: I0412 20:39:41.535470 1465 update_attempter.cc:643] Scheduling an action processor start. Apr 12 20:39:41.535797 update_engine[1465]: I0412 20:39:41.535503 1465 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:39:41.535797 update_engine[1465]: I0412 20:39:41.535571 1465 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 20:39:41.535797 update_engine[1465]: I0412 20:39:41.535743 1465 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:39:41.535797 update_engine[1465]: I0412 20:39:41.535770 1465 omaha_request_action.cc:271] Request: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: Apr 12 20:39:41.535797 update_engine[1465]: I0412 20:39:41.535787 1465 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:39:41.537064 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 20:39:41.539081 update_engine[1465]: I0412 20:39:41.539006 1465 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:39:41.539237 update_engine[1465]: E0412 20:39:41.539223 1465 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:39:41.539259 update_engine[1465]: I0412 20:39:41.539251 1465 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 20:39:51.538587 update_engine[1465]: I0412 20:39:51.538463 1465 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:39:51.539551 update_engine[1465]: I0412 20:39:51.539012 1465 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:39:51.539551 update_engine[1465]: E0412 20:39:51.539219 1465 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:39:51.539551 update_engine[1465]: I0412 20:39:51.539393 1465 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 20:39:55.291000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.291000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e37740 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:55.506280 kernel: audit: type=1400 audit(1712954395.291:1434): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.506328 kernel: audit: type=1300 audit(1712954395.291:1434): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e37740 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:55.506346 kernel: audit: type=1327 audit(1712954395.291:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:55.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:55.291000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.599732 kernel: audit: type=1400 audit(1712954395.291:1435): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.291000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c2c0c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:55.812935 kernel: audit: type=1300 audit(1712954395.291:1435): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c2c0c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:39:55.812982 kernel: audit: type=1327 audit(1712954395.291:1435): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:55.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:39:55.906027 kernel: audit: type=1400 audit(1712954395.597:1436): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.597000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.995816 kernel: audit: type=1300 audit(1712954395.597:1436): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0087db7e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:55.597000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0087db7e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:56.094069 kernel: audit: type=1327 audit(1712954395.597:1436): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:55.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:56.187316 kernel: audit: type=1400 audit(1712954395.598:1437): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c01172f800 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0105fca20 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c01172f950 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0087db820 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:39:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:39:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c005a459e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:39:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:40:00.310000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.339653 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:40:00.339693 kernel: audit: type=1400 audit(1712954400.310:1442): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.310000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e1a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:00.551263 kernel: audit: type=1300 audit(1712954400.310:1442): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e1a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:00.551295 kernel: audit: type=1327 audit(1712954400.310:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:00.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:00.644414 kernel: audit: type=1400 audit(1712954400.311:1443): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.311000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.735486 kernel: audit: type=1300 audit(1712954400.311:1443): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f9ea0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:00.311000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f9ea0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:00.857094 kernel: audit: type=1327 audit(1712954400.311:1443): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:00.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:00.951177 kernel: audit: type=1400 audit(1712954400.312:1444): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.312000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:01.041135 kernel: audit: type=1300 audit(1712954400.312:1444): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b48de0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:00.312000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b48de0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:01.161523 kernel: audit: type=1327 audit(1712954400.312:1444): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:00.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:01.254799 kernel: audit: type=1400 audit(1712954400.313:1445): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.313000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:00.313000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b48e00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:00.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:01.538070 update_engine[1465]: I0412 20:40:01.537850 1465 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:40:01.538856 update_engine[1465]: I0412 20:40:01.538292 1465 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:40:01.538856 update_engine[1465]: E0412 20:40:01.538475 1465 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:40:01.538856 update_engine[1465]: I0412 20:40:01.538627 1465 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 20:40:08.528000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:40:08.558203 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:40:08.558244 kernel: audit: type=1400 audit(1712954408.528:1446): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:40:08.528000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00058b8e0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:40:08.748552 kernel: audit: type=1300 audit(1712954408.528:1446): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00058b8e0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:40:08.748611 kernel: audit: type=1327 audit(1712954408.528:1446): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:40:08.528000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:40:08.590000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:40:08.937143 kernel: audit: type=1400 audit(1712954408.590:1447): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:40:08.937176 kernel: audit: type=1300 audit(1712954408.590:1447): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000328840 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:40:08.590000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000328840 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:40:09.035419 kernel: audit: type=1327 audit(1712954408.590:1447): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:40:08.590000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:40:11.538345 update_engine[1465]: I0412 20:40:11.538267 1465 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:40:11.539294 update_engine[1465]: I0412 20:40:11.538779 1465 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:40:11.539294 update_engine[1465]: E0412 20:40:11.538988 1465 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:40:11.539294 update_engine[1465]: I0412 20:40:11.539137 1465 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:40:11.539294 update_engine[1465]: I0412 20:40:11.539152 1465 omaha_request_action.cc:621] Omaha request response: Apr 12 20:40:11.539294 update_engine[1465]: E0412 20:40:11.539297 1465 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539325 1465 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539336 1465 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539345 1465 update_attempter.cc:306] Processing Done. Apr 12 20:40:11.539849 update_engine[1465]: E0412 20:40:11.539371 1465 update_attempter.cc:619] Update failed. Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539379 1465 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539388 1465 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539398 1465 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539551 1465 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539602 1465 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539611 1465 omaha_request_action.cc:271] Request: Apr 12 20:40:11.539849 update_engine[1465]: Apr 12 20:40:11.539849 update_engine[1465]: Apr 12 20:40:11.539849 update_engine[1465]: Apr 12 20:40:11.539849 update_engine[1465]: Apr 12 20:40:11.539849 update_engine[1465]: Apr 12 20:40:11.539849 update_engine[1465]: Apr 12 20:40:11.539849 update_engine[1465]: I0412 20:40:11.539623 1465 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.539966 1465 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:40:11.541427 update_engine[1465]: E0412 20:40:11.540127 1465 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540261 1465 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540274 1465 omaha_request_action.cc:621] Omaha request response: Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540285 1465 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540293 1465 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540300 1465 update_attempter.cc:306] Processing Done. Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540307 1465 update_attempter.cc:310] Error event sent. Apr 12 20:40:11.541427 update_engine[1465]: I0412 20:40:11.540328 1465 update_check_scheduler.cc:74] Next update check in 49m1s Apr 12 20:40:11.542281 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 20:40:11.542281 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 20:40:55.293000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.293000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b3c360 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:55.507716 kernel: audit: type=1400 audit(1712954455.293:1448): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.507767 kernel: audit: type=1300 audit(1712954455.293:1448): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b3c360 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:55.507786 kernel: audit: type=1327 audit(1712954455.293:1448): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:55.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:55.600811 kernel: audit: type=1400 audit(1712954455.293:1449): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.293000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.690808 kernel: audit: type=1300 audit(1712954455.293:1449): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c36a00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:55.293000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c36a00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:40:55.811218 kernel: audit: type=1327 audit(1712954455.293:1449): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:55.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:40:55.904405 kernel: audit: type=1400 audit(1712954455.598:1450): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.995312 kernel: audit: type=1400 audit(1712954455.598:1451): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:56.085890 kernel: audit: type=1400 audit(1712954455.598:1452): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.598000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:56.176091 kernel: audit: type=1300 audit(1712954455.598:1451): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c006fc7ec0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c006fc7ec0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00eadad80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:40:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:40:55.598000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00edb1de0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:40:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c010da7100 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:40:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006fc7f20 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:40:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:40:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00eadade0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:40:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:00.312000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.357508 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:41:00.357621 kernel: audit: type=1400 audit(1712954460.312:1456): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.312000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e040 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.570852 kernel: audit: type=1300 audit(1712954460.312:1456): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e040 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.570892 kernel: audit: type=1327 audit(1712954460.312:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:00.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:00.664803 kernel: audit: type=1400 audit(1712954460.313:1457): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.313000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.755569 kernel: audit: type=1300 audit(1712954460.313:1457): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e060 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.313000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e060 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.876994 kernel: audit: type=1327 audit(1712954460.313:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:00.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:00.970934 kernel: audit: type=1400 audit(1712954460.314:1458): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.314000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:01.061791 kernel: audit: type=1300 audit(1712954460.314:1458): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ccb3e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.314000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ccb3e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:01.277071 kernel: audit: type=1327 audit(1712954460.314:1458): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:01.277114 kernel: audit: type=1400 audit(1712954460.314:1459): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.314000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:00.314000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c376e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:00.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:08.531000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:41:08.559858 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:41:08.559942 kernel: audit: type=1400 audit(1712954468.531:1460): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:41:08.531000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b98280 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:41:08.753290 kernel: audit: type=1300 audit(1712954468.531:1460): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b98280 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:41:08.753321 kernel: audit: type=1327 audit(1712954468.531:1460): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:41:08.531000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:41:08.846888 kernel: audit: type=1400 audit(1712954468.591:1461): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:41:08.591000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:41:08.942630 kernel: audit: type=1300 audit(1712954468.591:1461): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d08080 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:41:08.591000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d08080 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:41:09.040488 kernel: audit: type=1327 audit(1712954468.591:1461): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:41:08.591000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:41:55.294000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.294000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1d0a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:55.509085 kernel: audit: type=1400 audit(1712954515.294:1462): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.509171 kernel: audit: type=1300 audit(1712954515.294:1462): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1d0a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:55.509190 kernel: audit: type=1327 audit(1712954515.294:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:55.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:55.294000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.602803 kernel: audit: type=1400 audit(1712954515.294:1463): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.294000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f5f140 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:55.815800 kernel: audit: type=1300 audit(1712954515.294:1463): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f5f140 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:41:55.815840 kernel: audit: type=1327 audit(1712954515.294:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:55.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:41:55.908818 kernel: audit: type=1400 audit(1712954515.599:1464): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.999173 kernel: audit: type=1300 audit(1712954515.599:1464): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00df34b10 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00df34b10 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:56.097351 kernel: audit: type=1327 audit(1712954515.599:1464): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:56.190575 kernel: audit: type=1400 audit(1712954515.599:1465): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.599000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.599000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c014fa7e60 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:55.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00699e220 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00df34c30 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c008674840 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:41:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00dcd3c00 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:41:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:41:58.858589 systemd[1]: Started sshd@7-139.178.91.217:22-211.223.41.90:58222.service. Apr 12 20:41:58.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.217:22-211.223.41.90:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:00.313000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:00.355309 kernel: kauditd_printk_skb: 15 callbacks suppressed Apr 12 20:42:00.355402 kernel: audit: type=1400 audit(1712954520.313:1471): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:00.313000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1d320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:00.568049 kernel: audit: type=1300 audit(1712954520.313:1471): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1d320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:00.568084 kernel: audit: type=1327 audit(1712954520.313:1471): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:00.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:00.661672 kernel: audit: type=1400 audit(1712954520.313:1472): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:00.313000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:00.751617 kernel: audit: type=1300 audit(1712954520.313:1472): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019b00e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:00.313000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019b00e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:00.871915 kernel: audit: type=1327 audit(1712954520.313:1472): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:00.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:00.964925 kernel: audit: type=1400 audit(1712954520.315:1473): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:00.315000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:01.054800 kernel: audit: type=1300 audit(1712954520.315:1473): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013cfba0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:00.315000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013cfba0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:01.175103 kernel: audit: type=1400 audit(1712954520.315:1474): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:00.315000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:01.265304 kernel: audit: type=1327 audit(1712954520.315:1473): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:00.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:00.315000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019b0100 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:00.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:01.419721 sshd[6540]: Invalid user blank from 211.223.41.90 port 58222 Apr 12 20:42:01.425690 sshd[6540]: pam_faillock(sshd:auth): User unknown Apr 12 20:42:01.426747 sshd[6540]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:42:01.426877 sshd[6540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.41.90 Apr 12 20:42:01.427885 sshd[6540]: pam_faillock(sshd:auth): User unknown Apr 12 20:42:01.427000 audit[6540]: USER_AUTH pid=6540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="blank" exe="/usr/sbin/sshd" hostname=211.223.41.90 addr=211.223.41.90 terminal=ssh res=failed' Apr 12 20:42:03.526957 sshd[6540]: Failed password for invalid user blank from 211.223.41.90 port 58222 ssh2 Apr 12 20:42:05.427761 sshd[6540]: Connection closed by invalid user blank 211.223.41.90 port 58222 [preauth] Apr 12 20:42:05.430472 systemd[1]: sshd@7-139.178.91.217:22-211.223.41.90:58222.service: Deactivated successfully. Apr 12 20:42:05.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.217:22-211.223.41.90:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:05.458492 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 20:42:05.458551 kernel: audit: type=1131 audit(1712954525.430:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.91.217:22-211.223.41.90:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:06.071076 systemd[1]: Started sshd@8-139.178.91.217:22-91.244.113.188:59857.service. Apr 12 20:42:06.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.217:22-91.244.113.188:59857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:06.161816 kernel: audit: type=1130 audit(1712954526.070:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.217:22-91.244.113.188:59857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:08.326380 sshd[6636]: Invalid user blank from 91.244.113.188 port 59857 Apr 12 20:42:08.332828 sshd[6636]: pam_faillock(sshd:auth): User unknown Apr 12 20:42:08.333861 sshd[6636]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:42:08.333950 sshd[6636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.244.113.188 Apr 12 20:42:08.335068 sshd[6636]: pam_faillock(sshd:auth): User unknown Apr 12 20:42:08.334000 audit[6636]: USER_AUTH pid=6636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="blank" exe="/usr/sbin/sshd" hostname=91.244.113.188 addr=91.244.113.188 terminal=ssh res=failed' Apr 12 20:42:08.426733 kernel: audit: type=1100 audit(1712954528.334:1478): pid=6636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="blank" exe="/usr/sbin/sshd" hostname=91.244.113.188 addr=91.244.113.188 terminal=ssh res=failed' Apr 12 20:42:08.532000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:42:08.532000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f16080 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:42:08.728933 kernel: audit: type=1400 audit(1712954528.532:1479): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:42:08.728998 kernel: audit: type=1300 audit(1712954528.532:1479): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001f16080 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:42:08.729016 kernel: audit: type=1327 audit(1712954528.532:1479): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:42:08.532000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:42:08.824253 kernel: audit: type=1400 audit(1712954528.591:1480): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:42:08.591000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:42:08.918913 kernel: audit: type=1300 audit(1712954528.591:1480): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a48360 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:42:08.591000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a48360 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:42:09.017940 kernel: audit: type=1327 audit(1712954528.591:1480): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:42:08.591000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:42:10.730119 sshd[6636]: Failed password for invalid user blank from 91.244.113.188 port 59857 ssh2 Apr 12 20:42:12.459052 sshd[6636]: Connection closed by invalid user blank 91.244.113.188 port 59857 [preauth] Apr 12 20:42:12.461663 systemd[1]: sshd@8-139.178.91.217:22-91.244.113.188:59857.service: Deactivated successfully. Apr 12 20:42:12.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.217:22-91.244.113.188:59857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:12.553931 kernel: audit: type=1131 audit(1712954532.461:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.91.217:22-91.244.113.188:59857 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:42:55.295000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.295000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021ae870 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:55.511311 kernel: audit: type=1400 audit(1712954575.295:1482): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.511352 kernel: audit: type=1300 audit(1712954575.295:1482): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021ae870 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:55.511370 kernel: audit: type=1327 audit(1712954575.295:1482): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:55.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:55.606059 kernel: audit: type=1400 audit(1712954575.295:1483): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.295000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.696264 kernel: audit: type=1300 audit(1712954575.295:1483): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025930c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:55.295000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025930c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:42:55.817008 kernel: audit: type=1327 audit(1712954575.295:1483): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:55.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:42:55.911175 kernel: audit: type=1400 audit(1712954575.600:1484): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:56.003049 kernel: audit: type=1300 audit(1712954575.600:1484): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00717da40 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00717da40 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:42:56.195818 kernel: audit: type=1327 audit(1712954575.600:1484): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:42:56.195854 kernel: audit: type=1400 audit(1712954575.600:1485): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00fee9a40 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:42:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00e811500 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:42:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c009706210 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:42:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c007d9a620 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:42:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:42:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c008171170 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:42:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:00.314000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:00.356796 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:43:00.356873 kernel: audit: type=1400 audit(1712954580.314:1490): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:00.314000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012a9f60 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:00.570645 kernel: audit: type=1300 audit(1712954580.314:1490): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012a9f60 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:00.570686 kernel: audit: type=1327 audit(1712954580.314:1490): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:00.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:00.664254 kernel: audit: type=1400 audit(1712954580.314:1491): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:00.314000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:00.754335 kernel: audit: type=1300 audit(1712954580.314:1491): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013cf420 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:00.314000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013cf420 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:00.874628 kernel: audit: type=1327 audit(1712954580.314:1491): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:00.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:00.967821 kernel: audit: type=1400 audit(1712954580.315:1492): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:00.315000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:01.057810 kernel: audit: type=1300 audit(1712954580.315:1492): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cca8a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:00.315000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cca8a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:01.178306 kernel: audit: type=1327 audit(1712954580.315:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:00.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:00.316000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:01.361391 kernel: audit: type=1400 audit(1712954580.316:1493): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:00.316000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012a9f80 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:00.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:08.532000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:43:08.560351 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:43:08.560407 kernel: audit: type=1400 audit(1712954588.532:1494): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:43:08.532000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b98ec0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:43:08.750148 kernel: audit: type=1300 audit(1712954588.532:1494): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b98ec0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:43:08.750187 kernel: audit: type=1327 audit(1712954588.532:1494): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:43:08.532000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:43:08.842509 kernel: audit: type=1400 audit(1712954588.592:1495): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:43:08.592000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:43:08.936222 kernel: audit: type=1300 audit(1712954588.592:1495): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018aa0e0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:43:08.592000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018aa0e0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:43:09.032769 kernel: audit: type=1327 audit(1712954588.592:1495): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:43:08.592000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:43:55.295000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.295000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000889ec0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:55.512816 kernel: audit: type=1400 audit(1712954635.295:1496): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.512873 kernel: audit: type=1300 audit(1712954635.295:1496): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000889ec0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:55.512891 kernel: audit: type=1327 audit(1712954635.295:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:55.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:55.605994 kernel: audit: type=1400 audit(1712954635.295:1497): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.295000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.695868 kernel: audit: type=1300 audit(1712954635.295:1497): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e2f760 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:55.295000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e2f760 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:43:55.816172 kernel: audit: type=1327 audit(1712954635.295:1497): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:55.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:43:55.909353 kernel: audit: type=1400 audit(1712954635.600:1498): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.999152 kernel: audit: type=1300 audit(1712954635.600:1498): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c003a3bc80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c003a3bc80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:56.097379 kernel: audit: type=1327 audit(1712954635.600:1498): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:56.190675 kernel: audit: type=1400 audit(1712954635.600:1499): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c010c8aba0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:55.600000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.600000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c012c35cb0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:55.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0104779e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:43:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00dca3ee0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:43:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012c35ce0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:43:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:00.314000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:00.357346 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:44:00.357446 kernel: audit: type=1400 audit(1712954640.314:1504): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:00.314000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c370a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.568619 kernel: audit: type=1300 audit(1712954640.314:1504): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c370a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.568666 kernel: audit: type=1327 audit(1712954640.314:1504): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:00.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:00.662121 kernel: audit: type=1400 audit(1712954640.314:1505): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:00.314000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:00.752901 kernel: audit: type=1300 audit(1712954640.314:1505): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00237c2a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.314000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00237c2a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.874717 kernel: audit: type=1327 audit(1712954640.314:1505): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:00.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:00.315000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:01.058603 kernel: audit: type=1400 audit(1712954640.315:1506): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:01.058673 kernel: audit: type=1300 audit(1712954640.315:1506): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1cbc0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.315000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1cbc0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:01.272371 kernel: audit: type=1327 audit(1712954640.315:1506): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:01.272402 kernel: audit: type=1400 audit(1712954640.315:1507): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:00.315000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:00.315000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e2fc40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:00.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:08.533000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:44:08.561910 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:44:08.561971 kernel: audit: type=1400 audit(1712954648.533:1508): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:44:08.533000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b99020 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:44:08.752435 kernel: audit: type=1300 audit(1712954648.533:1508): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b99020 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:44:08.752488 kernel: audit: type=1327 audit(1712954648.533:1508): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:44:08.533000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:44:08.845250 kernel: audit: type=1400 audit(1712954648.593:1509): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:44:08.593000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:44:08.939825 kernel: audit: type=1300 audit(1712954648.593:1509): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c9c460 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:44:08.593000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c9c460 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:44:09.037617 kernel: audit: type=1327 audit(1712954648.593:1509): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:44:08.593000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:44:55.297000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.297000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00237dca0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:55.512302 kernel: audit: type=1400 audit(1712954695.297:1510): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.512390 kernel: audit: type=1300 audit(1712954695.297:1510): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00237dca0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:55.512405 kernel: audit: type=1327 audit(1712954695.297:1510): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:55.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:55.605522 kernel: audit: type=1400 audit(1712954695.297:1511): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.297000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.297000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b3d6b0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:55.819134 kernel: audit: type=1300 audit(1712954695.297:1511): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b3d6b0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:44:55.819176 kernel: audit: type=1327 audit(1712954695.297:1511): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:55.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:44:55.912276 kernel: audit: type=1400 audit(1712954695.601:1512): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:56.002739 kernel: audit: type=1300 audit(1712954695.601:1512): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c007ebbf80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c007ebbf80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:56.100994 kernel: audit: type=1327 audit(1712954695.601:1512): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:56.194355 kernel: audit: type=1400 audit(1712954695.601:1514): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.601000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00714d350 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:55.601000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00fa6d8e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:55.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0071b6060 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0071b6240 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:44:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:44:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00ab5ae60 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:44:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:00.316000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:00.360758 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:45:00.360844 kernel: audit: type=1400 audit(1712954700.316:1518): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:00.316000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00237dfc0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:00.571763 kernel: audit: type=1300 audit(1712954700.316:1518): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00237dfc0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:00.571803 kernel: audit: type=1327 audit(1712954700.316:1518): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:00.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:00.664882 kernel: audit: type=1400 audit(1712954700.316:1519): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:00.316000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:00.754913 kernel: audit: type=1300 audit(1712954700.316:1519): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1d0c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:00.316000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1d0c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:00.876127 kernel: audit: type=1327 audit(1712954700.316:1519): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:00.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:00.316000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:01.061805 kernel: audit: type=1400 audit(1712954700.316:1521): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:01.061875 kernel: audit: type=1400 audit(1712954700.316:1520): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:00.316000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:01.152008 kernel: audit: type=1300 audit(1712954700.316:1521): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00237dfe0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:00.316000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00237dfe0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:01.272446 kernel: audit: type=1327 audit(1712954700.316:1521): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:00.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:00.316000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00010c2a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:00.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:08.535000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:45:08.562949 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:45:08.563019 kernel: audit: type=1400 audit(1712954708.535:1522): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:45:08.535000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b98200 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:45:08.754722 kernel: audit: type=1300 audit(1712954708.535:1522): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b98200 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:45:08.754796 kernel: audit: type=1327 audit(1712954708.535:1522): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:45:08.535000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:45:08.848105 kernel: audit: type=1400 audit(1712954708.593:1523): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:45:08.593000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:45:08.943315 kernel: audit: type=1300 audit(1712954708.593:1523): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00061f580 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:45:08.593000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00061f580 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:45:09.041708 kernel: audit: type=1327 audit(1712954708.593:1523): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:45:08.593000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:45:55.298000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.298000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002593480 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:55.512815 kernel: audit: type=1400 audit(1712954755.298:1524): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.512872 kernel: audit: type=1300 audit(1712954755.298:1524): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002593480 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:55.512890 kernel: audit: type=1327 audit(1712954755.298:1524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:55.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:55.606223 kernel: audit: type=1400 audit(1712954755.298:1525): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.298000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.697414 kernel: audit: type=1300 audit(1712954755.298:1525): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129f5c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:55.298000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129f5c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:45:55.817948 kernel: audit: type=1327 audit(1712954755.298:1525): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:55.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:45:55.911227 kernel: audit: type=1400 audit(1712954755.602:1526): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.602000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:56.001894 kernel: audit: type=1300 audit(1712954755.602:1526): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c011dfed50 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:55.602000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c011dfed50 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:56.100079 kernel: audit: type=1327 audit(1712954755.602:1526): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:55.602000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:56.193404 kernel: audit: type=1400 audit(1712954755.603:1527): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c011dfed80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007577ee0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0095beab0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c011dfee10 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:45:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:45:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c003e52f80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:45:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:00.317000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:00.345969 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:46:00.346021 kernel: audit: type=1400 audit(1712954760.317:1532): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:00.317000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e1e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.557915 kernel: audit: type=1300 audit(1712954760.317:1532): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e1e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.557944 kernel: audit: type=1327 audit(1712954760.317:1532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:00.317000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:00.650988 kernel: audit: type=1400 audit(1712954760.317:1533): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:00.317000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:00.741602 kernel: audit: type=1300 audit(1712954760.317:1533): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ec5d20 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.317000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ec5d20 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.864394 kernel: audit: type=1327 audit(1712954760.317:1533): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:00.317000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:00.958110 kernel: audit: type=1400 audit(1712954760.317:1534): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:00.317000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:01.048094 kernel: audit: type=1300 audit(1712954760.317:1534): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e36520 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.317000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e36520 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.317000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:01.168923 kernel: audit: type=1327 audit(1712954760.317:1534): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:00.317000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:01.261792 kernel: audit: type=1400 audit(1712954760.317:1535): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:00.317000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6e200 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:00.317000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:08.536000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:46:08.564870 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:46:08.564966 kernel: audit: type=1400 audit(1712954768.536:1536): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:46:08.536000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c02b00 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:46:08.755010 kernel: audit: type=1300 audit(1712954768.536:1536): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c02b00 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:46:08.755084 kernel: audit: type=1327 audit(1712954768.536:1536): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:46:08.536000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:46:08.847719 kernel: audit: type=1400 audit(1712954768.593:1537): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:46:08.593000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:46:08.942543 kernel: audit: type=1300 audit(1712954768.593:1537): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00169e140 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:46:08.593000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00169e140 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:46:09.040759 kernel: audit: type=1327 audit(1712954768.593:1537): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:46:08.593000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:46:55.299000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.299000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6f280 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:55.514179 kernel: audit: type=1400 audit(1712954815.299:1538): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.514220 kernel: audit: type=1300 audit(1712954815.299:1538): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6f280 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:55.514236 kernel: audit: type=1327 audit(1712954815.299:1538): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:55.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:55.299000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.702601 kernel: audit: type=1400 audit(1712954815.299:1539): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.702679 kernel: audit: type=1300 audit(1712954815.299:1539): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001e7a600 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:55.299000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001e7a600 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:46:55.822816 kernel: audit: type=1327 audit(1712954815.299:1539): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:55.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:46:55.915947 kernel: audit: type=1400 audit(1712954815.603:1540): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:56.005624 kernel: audit: type=1300 audit(1712954815.603:1540): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c010da7da0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c010da7da0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:56.103730 kernel: audit: type=1327 audit(1712954815.603:1540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:56.196913 kernel: audit: type=1400 audit(1712954815.603:1541): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c009093f80 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006fc7920 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00714c0c0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006fc7950 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:46:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:46:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c010da7e20 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:46:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:00.318000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.346724 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:47:00.346808 kernel: audit: type=1400 audit(1712954820.318:1546): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.318000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.527976 kernel: audit: type=1400 audit(1712954820.318:1547): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.528014 kernel: audit: type=1300 audit(1712954820.318:1546): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00280ca40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:00.318000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00280ca40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:00.648251 kernel: audit: type=1327 audit(1712954820.318:1546): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:00.318000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:00.741985 kernel: audit: type=1300 audit(1712954820.318:1547): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013cf020 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:00.318000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013cf020 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:00.863027 kernel: audit: type=1327 audit(1712954820.318:1547): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:00.318000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:00.957948 kernel: audit: type=1400 audit(1712954820.318:1548): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.318000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:01.048800 kernel: audit: type=1300 audit(1712954820.318:1548): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002e2e260 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:00.318000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002e2e260 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:01.169033 kernel: audit: type=1327 audit(1712954820.318:1548): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:00.318000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:01.262039 kernel: audit: type=1400 audit(1712954820.318:1549): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.318000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:00.318000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6f2a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:00.318000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:08.537000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:47:08.579579 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:47:08.579670 kernel: audit: type=1400 audit(1712954828.537:1550): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:47:08.537000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c02720 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:47:08.770152 kernel: audit: type=1300 audit(1712954828.537:1550): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c02720 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:47:08.770183 kernel: audit: type=1327 audit(1712954828.537:1550): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:47:08.537000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:47:08.863375 kernel: audit: type=1400 audit(1712954828.594:1551): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:47:08.594000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:47:08.957877 kernel: audit: type=1300 audit(1712954828.594:1551): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018aa1e0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:47:08.594000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018aa1e0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:47:09.056546 kernel: audit: type=1327 audit(1712954828.594:1551): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:47:08.594000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:47:55.300000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.300000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027279e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:55.514606 kernel: audit: type=1400 audit(1712954875.300:1552): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.514672 kernel: audit: type=1300 audit(1712954875.300:1552): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027279e0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:55.514694 kernel: audit: type=1327 audit(1712954875.300:1552): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:55.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:55.609616 kernel: audit: type=1400 audit(1712954875.300:1553): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.300000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.702819 kernel: audit: type=1300 audit(1712954875.300:1553): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c2ce40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:55.300000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c2ce40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:47:55.822987 kernel: audit: type=1327 audit(1712954875.300:1553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:55.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:47:55.916043 kernel: audit: type=1400 audit(1712954875.603:1554): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:56.007267 kernel: audit: type=1300 audit(1712954875.603:1554): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0078f8c00 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0078f8c00 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:56.105610 kernel: audit: type=1327 audit(1712954875.603:1554): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:56.198896 kernel: audit: type=1400 audit(1712954875.604:1555): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0078f8c30 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c005c753e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c008033a10 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0075bcea0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:47:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:47:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0078f8cc0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:47:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.347811 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:48:00.347888 kernel: audit: type=1400 audit(1712954880.319:1560): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019b1f80 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:00.439802 kernel: audit: type=1300 audit(1712954880.319:1560): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019b1f80 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:00.653842 kernel: audit: type=1327 audit(1712954880.319:1560): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:00.653875 kernel: audit: type=1400 audit(1712954880.319:1561): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.744229 kernel: audit: type=1300 audit(1712954880.319:1561): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001ccb320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001ccb320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:00.866193 kernel: audit: type=1327 audit(1712954880.319:1561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:00.960087 kernel: audit: type=1400 audit(1712954880.319:1562): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:01.050119 kernel: audit: type=1300 audit(1712954880.319:1562): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fb4c80 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fb4c80 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:01.170576 kernel: audit: type=1327 audit(1712954880.319:1562): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:01.263798 kernel: audit: type=1400 audit(1712954880.319:1563): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c36040 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:08.538000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:48:08.566709 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:48:08.566794 kernel: audit: type=1400 audit(1712954888.538:1564): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:48:08.538000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001bb32a0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:48:08.758970 kernel: audit: type=1300 audit(1712954888.538:1564): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001bb32a0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:48:08.759013 kernel: audit: type=1327 audit(1712954888.538:1564): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:48:08.538000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:48:08.852332 kernel: audit: type=1400 audit(1712954888.595:1565): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:48:08.595000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:48:08.946607 kernel: audit: type=1300 audit(1712954888.595:1565): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003295e0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:48:08.595000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003295e0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:48:09.044421 kernel: audit: type=1327 audit(1712954888.595:1565): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:48:08.595000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:48:55.300000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.300000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001247110 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:55.516552 kernel: audit: type=1400 audit(1712954935.300:1566): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.516596 kernel: audit: type=1300 audit(1712954935.300:1566): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001247110 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:55.516614 kernel: audit: type=1327 audit(1712954935.300:1566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:55.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:55.301000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.699452 kernel: audit: type=1400 audit(1712954935.301:1567): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.699489 kernel: audit: type=1300 audit(1712954935.301:1567): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c37ae0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:55.301000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c37ae0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:48:55.819700 kernel: audit: type=1327 audit(1712954935.301:1567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:55.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:48:55.912733 kernel: audit: type=1400 audit(1712954935.603:1568): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:56.002464 kernel: audit: type=1300 audit(1712954935.603:1568): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c007fa0080 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c007fa0080 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:56.100679 kernel: audit: type=1327 audit(1712954935.603:1568): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:56.193905 kernel: audit: type=1400 audit(1712954935.603:1570): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007fa00a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c008029800 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00eada690 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c008029830 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:48:55.603000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:48:55.603000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00eada6f0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:48:55.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.348925 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:49:00.348982 kernel: audit: type=1400 audit(1712954940.319:1574): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.530500 kernel: audit: type=1400 audit(1712954940.319:1575): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.530533 kernel: audit: type=1300 audit(1712954940.319:1574): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006afca0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006afca0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:00.650800 kernel: audit: type=1300 audit(1712954940.319:1575): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ad2ac0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ad2ac0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:00.771217 kernel: audit: type=1327 audit(1712954940.319:1575): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:00.864943 kernel: audit: type=1327 audit(1712954940.319:1574): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:00.960542 kernel: audit: type=1400 audit(1712954940.319:1576): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:01.051595 kernel: audit: type=1300 audit(1712954940.319:1576): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e2fe20 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e2fe20 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:01.172076 kernel: audit: type=1327 audit(1712954940.319:1576): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:01.265266 kernel: audit: type=1400 audit(1712954940.319:1577): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.319000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:00.319000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000597620 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:00.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:08.539000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:49:08.568326 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:49:08.568404 kernel: audit: type=1400 audit(1712954948.539:1578): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:49:08.539000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e340a0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:49:08.761730 kernel: audit: type=1300 audit(1712954948.539:1578): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e340a0 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:49:08.761805 kernel: audit: type=1327 audit(1712954948.539:1578): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:49:08.539000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:49:08.854885 kernel: audit: type=1400 audit(1712954948.594:1579): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:49:08.594000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:49:08.948586 kernel: audit: type=1300 audit(1712954948.594:1579): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00169e0a0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:49:08.594000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00169e0a0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:49:09.045123 kernel: audit: type=1327 audit(1712954948.594:1579): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:49:08.594000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:49:55.301000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.301000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a37d10 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:55.518762 kernel: audit: type=1400 audit(1712954995.301:1580): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.518849 kernel: audit: type=1300 audit(1712954995.301:1580): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a37d10 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:55.518868 kernel: audit: type=1327 audit(1712954995.301:1580): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:55.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:55.301000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.703345 kernel: audit: type=1400 audit(1712954995.301:1581): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.703418 kernel: audit: type=1300 audit(1712954995.301:1581): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6f0c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:55.301000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c6f0c0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:49:55.824395 kernel: audit: type=1327 audit(1712954995.301:1581): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:55.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:49:55.917954 kernel: audit: type=1400 audit(1712954995.604:1582): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c012005320 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:56.109322 kernel: audit: type=1300 audit(1712954995.604:1582): arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c012005320 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:56.109357 kernel: audit: type=1327 audit(1712954995.604:1582): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:56.202450 kernel: audit: type=1400 audit(1712954995.604:1583): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c00be03d20 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003e53580 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0120053b0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c004349710 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:49:55.604000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:49:55.604000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0085550e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:49:55.604000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:00.321000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.364591 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:50:00.364700 kernel: audit: type=1400 audit(1712955000.321:1588): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.321000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00280c560 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:00.577226 kernel: audit: type=1300 audit(1712955000.321:1588): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00280c560 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:00.577271 kernel: audit: type=1327 audit(1712955000.321:1588): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:00.321000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:00.670690 kernel: audit: type=1400 audit(1712955000.321:1589): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.321000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.762600 kernel: audit: type=1300 audit(1712955000.321:1589): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1db00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:00.321000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1db00 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:00.321000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:00.976716 kernel: audit: type=1327 audit(1712955000.321:1589): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:00.976788 kernel: audit: type=1400 audit(1712955000.321:1590): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.321000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.321000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001c1db20 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:01.187439 kernel: audit: type=1300 audit(1712955000.321:1590): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001c1db20 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:01.187483 kernel: audit: type=1327 audit(1712955000.321:1590): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:00.321000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:01.280648 kernel: audit: type=1400 audit(1712955000.321:1591): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.321000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:00.321000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013cfd60 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:00.321000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:08.541000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:50:08.584894 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:50:08.584985 kernel: audit: type=1400 audit(1712955008.541:1592): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:50:08.541000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001bb2520 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:50:08.777311 kernel: audit: type=1300 audit(1712955008.541:1592): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001bb2520 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:50:08.777385 kernel: audit: type=1327 audit(1712955008.541:1592): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:50:08.541000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:50:08.870118 kernel: audit: type=1400 audit(1712955008.596:1593): avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:50:08.596000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:50:08.964001 kernel: audit: type=1300 audit(1712955008.596:1593): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000114be0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:50:08.596000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000114be0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:50:09.060826 kernel: audit: type=1327 audit(1712955008.596:1593): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:50:08.596000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:50:52.044703 systemd[1]: Started sshd@9-139.178.91.217:22-147.75.109.163:40904.service. Apr 12 20:50:52.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.217:22-147.75.109.163:40904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:52.134810 kernel: audit: type=1130 audit(1712955052.044:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.217:22-147.75.109.163:40904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:52.163000 audit[8677]: USER_ACCT pid=8677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.164236 sshd[8677]: Accepted publickey for core from 147.75.109.163 port 40904 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:50:52.166101 sshd[8677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:50:52.168634 systemd-logind[1463]: New session 10 of user core. Apr 12 20:50:52.169163 systemd[1]: Started session-10.scope. Apr 12 20:50:52.251598 sshd[8677]: pam_unix(sshd:session): session closed for user core Apr 12 20:50:52.253151 systemd[1]: sshd@9-139.178.91.217:22-147.75.109.163:40904.service: Deactivated successfully. Apr 12 20:50:52.253603 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 20:50:52.254012 systemd-logind[1463]: Session 10 logged out. Waiting for processes to exit. Apr 12 20:50:52.254440 systemd-logind[1463]: Removed session 10. Apr 12 20:50:52.165000 audit[8677]: CRED_ACQ pid=8677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.348121 kernel: audit: type=1101 audit(1712955052.163:1595): pid=8677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.348162 kernel: audit: type=1103 audit(1712955052.165:1596): pid=8677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.348179 kernel: audit: type=1006 audit(1712955052.165:1597): pid=8677 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 20:50:52.165000 audit[8677]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff51d8ec20 a2=3 a3=0 items=0 ppid=1 pid=8677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:52.499951 kernel: audit: type=1300 audit(1712955052.165:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff51d8ec20 a2=3 a3=0 items=0 ppid=1 pid=8677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:52.500015 kernel: audit: type=1327 audit(1712955052.165:1597): proctitle=737368643A20636F7265205B707269765D Apr 12 20:50:52.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:50:52.530815 kernel: audit: type=1105 audit(1712955052.170:1598): pid=8677 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.170000 audit[8677]: USER_START pid=8677 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.626327 kernel: audit: type=1103 audit(1712955052.170:1599): pid=8679 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.170000 audit[8679]: CRED_ACQ pid=8679 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.715600 kernel: audit: type=1106 audit(1712955052.251:1600): pid=8677 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.251000 audit[8677]: USER_END pid=8677 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.811153 kernel: audit: type=1104 audit(1712955052.251:1601): pid=8677 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.251000 audit[8677]: CRED_DISP pid=8677 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:52.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.91.217:22-147.75.109.163:40904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:55.303000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.303000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00129f0b0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:55.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:55.303000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.303000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00237c500 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:50:55.303000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:55.605000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.605000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.605000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c008964c00 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:50:55.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:55.605000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.605000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c005ca57d0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:50:55.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:55.605000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00278dc00 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:50:55.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:55.605000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.605000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c007fc9500 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:50:55.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:55.605000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.605000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c01551a660 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:50:55.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:55.605000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:55.605000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00dca25c0 a2=fc6 a3=0 items=0 ppid=2219 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c390,c474 key=(null) Apr 12 20:50:55.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39312E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:57.260857 systemd[1]: Started sshd@10-139.178.91.217:22-147.75.109.163:39090.service. Apr 12 20:50:57.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.217:22-147.75.109.163:39090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:57.261790 systemd[1]: Starting systemd-tmpfiles-clean.service... Apr 12 20:50:57.287985 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 20:50:57.288027 kernel: audit: type=1130 audit(1712955057.260:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.217:22-147.75.109.163:39090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:57.382018 systemd-tmpfiles[8705]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:50:57.382251 systemd-tmpfiles[8705]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:50:57.382946 systemd-tmpfiles[8705]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:50:57.394237 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Apr 12 20:50:57.394336 systemd[1]: Finished systemd-tmpfiles-clean.service. Apr 12 20:50:57.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:57.396120 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Apr 12 20:50:57.406611 sshd[8704]: Accepted publickey for core from 147.75.109.163 port 39090 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:50:57.408060 sshd[8704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:50:57.410284 systemd-logind[1463]: New session 11 of user core. Apr 12 20:50:57.411995 systemd[1]: Started session-11.scope. Apr 12 20:50:57.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:57.491815 sshd[8704]: pam_unix(sshd:session): session closed for user core Apr 12 20:50:57.493152 systemd[1]: sshd@10-139.178.91.217:22-147.75.109.163:39090.service: Deactivated successfully. Apr 12 20:50:57.493614 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 20:50:57.493981 systemd-logind[1463]: Session 11 logged out. Waiting for processes to exit. Apr 12 20:50:57.494388 systemd-logind[1463]: Removed session 11. Apr 12 20:50:57.568375 kernel: audit: type=1130 audit(1712955057.393:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:57.568415 kernel: audit: type=1131 audit(1712955057.393:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:57.568433 kernel: audit: type=1101 audit(1712955057.405:1614): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.405000 audit[8704]: USER_ACCT pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.407000 audit[8704]: CRED_ACQ pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.752147 kernel: audit: type=1103 audit(1712955057.407:1615): pid=8704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.752189 kernel: audit: type=1006 audit(1712955057.407:1616): pid=8704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 20:50:57.811189 kernel: audit: type=1300 audit(1712955057.407:1616): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e767a90 a2=3 a3=0 items=0 ppid=1 pid=8704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:57.407000 audit[8704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e767a90 a2=3 a3=0 items=0 ppid=1 pid=8704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:57.903992 kernel: audit: type=1327 audit(1712955057.407:1616): proctitle=737368643A20636F7265205B707269765D Apr 12 20:50:57.407000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:50:57.934816 kernel: audit: type=1105 audit(1712955057.413:1617): pid=8704 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.413000 audit[8704]: USER_START pid=8704 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:58.030248 kernel: audit: type=1103 audit(1712955057.413:1618): pid=8710 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.413000 audit[8710]: CRED_ACQ pid=8710 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.491000 audit[8704]: USER_END pid=8704 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.491000 audit[8704]: CRED_DISP pid=8704 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:50:57.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.91.217:22-147.75.109.163:39090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:00.322000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:00.322000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012a9320 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:51:00.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:00.322000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:00.322000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:00.322000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d1dd40 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:51:00.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:00.322000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012a9340 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:51:00.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:00.322000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:00.322000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00237d0a0 a2=fc6 a3=0 items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c811,c896 key=(null) Apr 12 20:51:00.322000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:02.501855 systemd[1]: Started sshd@11-139.178.91.217:22-147.75.109.163:39098.service. Apr 12 20:51:02.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.217:22-147.75.109.163:39098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:02.528699 kernel: kauditd_printk_skb: 15 callbacks suppressed Apr 12 20:51:02.528765 kernel: audit: type=1130 audit(1712955062.501:1626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.217:22-147.75.109.163:39098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:02.647000 audit[8786]: USER_ACCT pid=8786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.648081 sshd[8786]: Accepted publickey for core from 147.75.109.163 port 39098 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:02.650048 sshd[8786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:02.652447 systemd-logind[1463]: New session 12 of user core. Apr 12 20:51:02.653108 systemd[1]: Started session-12.scope. Apr 12 20:51:02.733325 sshd[8786]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:02.734779 systemd[1]: sshd@11-139.178.91.217:22-147.75.109.163:39098.service: Deactivated successfully. Apr 12 20:51:02.735236 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 20:51:02.735550 systemd-logind[1463]: Session 12 logged out. Waiting for processes to exit. Apr 12 20:51:02.735991 systemd-logind[1463]: Removed session 12. Apr 12 20:51:02.649000 audit[8786]: CRED_ACQ pid=8786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.830876 kernel: audit: type=1101 audit(1712955062.647:1627): pid=8786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.830913 kernel: audit: type=1103 audit(1712955062.649:1628): pid=8786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.830931 kernel: audit: type=1006 audit(1712955062.649:1629): pid=8786 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 20:51:02.889354 kernel: audit: type=1300 audit(1712955062.649:1629): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc427c680 a2=3 a3=0 items=0 ppid=1 pid=8786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:02.649000 audit[8786]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc427c680 a2=3 a3=0 items=0 ppid=1 pid=8786 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:02.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:03.011712 kernel: audit: type=1327 audit(1712955062.649:1629): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:03.011765 kernel: audit: type=1105 audit(1712955062.654:1630): pid=8786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.654000 audit[8786]: USER_START pid=8786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:03.106221 kernel: audit: type=1103 audit(1712955062.655:1631): pid=8788 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.655000 audit[8788]: CRED_ACQ pid=8788 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:03.195367 kernel: audit: type=1106 audit(1712955062.733:1632): pid=8786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.733000 audit[8786]: USER_END pid=8786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:03.290808 kernel: audit: type=1104 audit(1712955062.733:1633): pid=8786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.733000 audit[8786]: CRED_DISP pid=8786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:02.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.91.217:22-147.75.109.163:39098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:07.745330 systemd[1]: Started sshd@12-139.178.91.217:22-147.75.109.163:43958.service. Apr 12 20:51:07.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.217:22-147.75.109.163:43958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:07.772646 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:51:07.772714 kernel: audit: type=1130 audit(1712955067.745:1635): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.217:22-147.75.109.163:43958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:07.890000 audit[8850]: USER_ACCT pid=8850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:07.891107 sshd[8850]: Accepted publickey for core from 147.75.109.163 port 43958 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:07.892391 sshd[8850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:07.894796 systemd-logind[1463]: New session 13 of user core. Apr 12 20:51:07.895268 systemd[1]: Started session-13.scope. Apr 12 20:51:07.973899 sshd[8850]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:07.977171 systemd[1]: sshd@12-139.178.91.217:22-147.75.109.163:43958.service: Deactivated successfully. Apr 12 20:51:07.977888 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 20:51:07.978521 systemd-logind[1463]: Session 13 logged out. Waiting for processes to exit. Apr 12 20:51:07.979889 systemd[1]: Started sshd@13-139.178.91.217:22-147.75.109.163:43970.service. Apr 12 20:51:07.980660 systemd-logind[1463]: Removed session 13. Apr 12 20:51:07.891000 audit[8850]: CRED_ACQ pid=8850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.071986 kernel: audit: type=1101 audit(1712955067.890:1636): pid=8850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.072030 kernel: audit: type=1103 audit(1712955067.891:1637): pid=8850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.072046 kernel: audit: type=1006 audit(1712955067.891:1638): pid=8850 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 20:51:08.130013 kernel: audit: type=1300 audit(1712955067.891:1638): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbfc73cc0 a2=3 a3=0 items=0 ppid=1 pid=8850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:07.891000 audit[8850]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbfc73cc0 a2=3 a3=0 items=0 ppid=1 pid=8850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:08.159470 sshd[8875]: Accepted publickey for core from 147.75.109.163 port 43970 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:08.160717 sshd[8875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:08.163680 systemd-logind[1463]: New session 14 of user core. Apr 12 20:51:08.165227 systemd[1]: Started session-14.scope. Apr 12 20:51:08.221914 kernel: audit: type=1327 audit(1712955067.891:1638): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:07.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:07.896000 audit[8850]: USER_START pid=8850 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.346874 kernel: audit: type=1105 audit(1712955067.896:1639): pid=8850 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.346951 kernel: audit: type=1103 audit(1712955067.896:1640): pid=8852 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:07.896000 audit[8852]: CRED_ACQ pid=8852 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.436084 kernel: audit: type=1106 audit(1712955067.973:1641): pid=8850 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:07.973000 audit[8850]: USER_END pid=8850 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.531586 kernel: audit: type=1104 audit(1712955067.974:1642): pid=8850 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:07.974000 audit[8850]: CRED_DISP pid=8850 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.602237 sshd[8875]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:08.605326 systemd[1]: sshd@13-139.178.91.217:22-147.75.109.163:43970.service: Deactivated successfully. Apr 12 20:51:08.606090 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 20:51:08.606740 systemd-logind[1463]: Session 14 logged out. Waiting for processes to exit. Apr 12 20:51:08.607602 systemd[1]: Started sshd@14-139.178.91.217:22-147.75.109.163:43976.service. Apr 12 20:51:08.608040 systemd-logind[1463]: Removed session 14. Apr 12 20:51:07.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.91.217:22-147.75.109.163:43958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:07.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.217:22-147.75.109.163:43970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:08.158000 audit[8875]: USER_ACCT pid=8875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.159000 audit[8875]: CRED_ACQ pid=8875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.159000 audit[8875]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6c9468f0 a2=3 a3=0 items=0 ppid=1 pid=8875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:08.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:08.167000 audit[8875]: USER_START pid=8875 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.168000 audit[8877]: CRED_ACQ pid=8877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.542000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.493137133/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c9,c861 tclass=file permissive=0 Apr 12 20:51:08.542000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00097c040 a2=fc6 a3=0 items=0 ppid=5508 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c861 key=(null) Apr 12 20:51:08.542000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:51:08.597000 audit[5579]: AVC avc: denied { watch } for pid=5579 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_38_03.3634193980/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c599 tclass=file permissive=0 Apr 12 20:51:08.597000 audit[5579]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00169e0a0 a2=fc6 a3=0 items=0 ppid=5474 pid=5579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c599 key=(null) Apr 12 20:51:08.597000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:51:08.602000 audit[8875]: USER_END pid=8875 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.602000 audit[8875]: CRED_DISP pid=8875 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.91.217:22-147.75.109.163:43970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:08.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.217:22-147.75.109.163:43976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:08.666000 audit[8898]: USER_ACCT pid=8898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.667324 sshd[8898]: Accepted publickey for core from 147.75.109.163 port 43976 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:08.667000 audit[8898]: CRED_ACQ pid=8898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.667000 audit[8898]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbd562110 a2=3 a3=0 items=0 ppid=1 pid=8898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:08.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:08.669196 sshd[8898]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:08.675232 systemd-logind[1463]: New session 15 of user core. Apr 12 20:51:08.676905 systemd[1]: Started session-15.scope. Apr 12 20:51:08.683000 audit[8898]: USER_START pid=8898 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.685000 audit[8902]: CRED_ACQ pid=8902 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.810163 sshd[8898]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:08.810000 audit[8898]: USER_END pid=8898 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.810000 audit[8898]: CRED_DISP pid=8898 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:08.811574 systemd[1]: sshd@14-139.178.91.217:22-147.75.109.163:43976.service: Deactivated successfully. Apr 12 20:51:08.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.91.217:22-147.75.109.163:43976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:08.812029 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 20:51:08.812411 systemd-logind[1463]: Session 15 logged out. Waiting for processes to exit. Apr 12 20:51:08.812909 systemd-logind[1463]: Removed session 15. Apr 12 20:51:13.822206 systemd[1]: Started sshd@15-139.178.91.217:22-147.75.109.163:43986.service. Apr 12 20:51:13.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.217:22-147.75.109.163:43986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:13.849876 kernel: kauditd_printk_skb: 29 callbacks suppressed Apr 12 20:51:13.849955 kernel: audit: type=1130 audit(1712955073.821:1664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.217:22-147.75.109.163:43986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:13.968000 audit[8936]: USER_ACCT pid=8936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:13.969231 sshd[8936]: Accepted publickey for core from 147.75.109.163 port 43986 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:13.970400 sshd[8936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:13.972683 systemd-logind[1463]: New session 16 of user core. Apr 12 20:51:13.973198 systemd[1]: Started session-16.scope. Apr 12 20:51:14.052671 sshd[8936]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:14.054105 systemd[1]: sshd@15-139.178.91.217:22-147.75.109.163:43986.service: Deactivated successfully. Apr 12 20:51:14.054541 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 20:51:14.054929 systemd-logind[1463]: Session 16 logged out. Waiting for processes to exit. Apr 12 20:51:14.055474 systemd-logind[1463]: Removed session 16. Apr 12 20:51:13.969000 audit[8936]: CRED_ACQ pid=8936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.151050 kernel: audit: type=1101 audit(1712955073.968:1665): pid=8936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.151086 kernel: audit: type=1103 audit(1712955073.969:1666): pid=8936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.151105 kernel: audit: type=1006 audit(1712955073.969:1667): pid=8936 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 20:51:14.209612 kernel: audit: type=1300 audit(1712955073.969:1667): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f975890 a2=3 a3=0 items=0 ppid=1 pid=8936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:13.969000 audit[8936]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f975890 a2=3 a3=0 items=0 ppid=1 pid=8936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:14.301717 kernel: audit: type=1327 audit(1712955073.969:1667): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:13.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:14.332231 kernel: audit: type=1105 audit(1712955073.974:1668): pid=8936 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:13.974000 audit[8936]: USER_START pid=8936 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.426685 kernel: audit: type=1103 audit(1712955073.975:1669): pid=8938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:13.975000 audit[8938]: CRED_ACQ pid=8938 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.515891 kernel: audit: type=1106 audit(1712955074.052:1670): pid=8936 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.052000 audit[8936]: USER_END pid=8936 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.611368 kernel: audit: type=1104 audit(1712955074.052:1671): pid=8936 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.052000 audit[8936]: CRED_DISP pid=8936 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:14.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.91.217:22-147.75.109.163:43986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:19.063016 systemd[1]: Started sshd@16-139.178.91.217:22-147.75.109.163:52850.service. Apr 12 20:51:19.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.217:22-147.75.109.163:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:19.089942 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:51:19.090009 kernel: audit: type=1130 audit(1712955079.062:1673): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.217:22-147.75.109.163:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:19.207808 sshd[8961]: Accepted publickey for core from 147.75.109.163 port 52850 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:19.207000 audit[8961]: USER_ACCT pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.209020 sshd[8961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:19.211428 systemd-logind[1463]: New session 17 of user core. Apr 12 20:51:19.211906 systemd[1]: Started session-17.scope. Apr 12 20:51:19.291669 sshd[8961]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:19.293140 systemd[1]: sshd@16-139.178.91.217:22-147.75.109.163:52850.service: Deactivated successfully. Apr 12 20:51:19.293601 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 20:51:19.293992 systemd-logind[1463]: Session 17 logged out. Waiting for processes to exit. Apr 12 20:51:19.294564 systemd-logind[1463]: Removed session 17. Apr 12 20:51:19.208000 audit[8961]: CRED_ACQ pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.389623 kernel: audit: type=1101 audit(1712955079.207:1674): pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.389673 kernel: audit: type=1103 audit(1712955079.208:1675): pid=8961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.389693 kernel: audit: type=1006 audit(1712955079.208:1676): pid=8961 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 20:51:19.448226 kernel: audit: type=1300 audit(1712955079.208:1676): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcff54b0 a2=3 a3=0 items=0 ppid=1 pid=8961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:19.208000 audit[8961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcff54b0 a2=3 a3=0 items=0 ppid=1 pid=8961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:19.540200 kernel: audit: type=1327 audit(1712955079.208:1676): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:19.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:19.570701 kernel: audit: type=1105 audit(1712955079.213:1677): pid=8961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.213000 audit[8961]: USER_START pid=8961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.665149 kernel: audit: type=1103 audit(1712955079.214:1678): pid=8963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.214000 audit[8963]: CRED_ACQ pid=8963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.754298 kernel: audit: type=1106 audit(1712955079.291:1679): pid=8961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.291000 audit[8961]: USER_END pid=8961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.849732 kernel: audit: type=1104 audit(1712955079.291:1680): pid=8961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.291000 audit[8961]: CRED_DISP pid=8961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:19.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.91.217:22-147.75.109.163:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:24.301160 systemd[1]: Started sshd@17-139.178.91.217:22-147.75.109.163:52862.service. Apr 12 20:51:24.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.217:22-147.75.109.163:52862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:24.328373 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:51:24.328454 kernel: audit: type=1130 audit(1712955084.300:1682): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.217:22-147.75.109.163:52862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:24.447000 audit[8996]: USER_ACCT pid=8996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.448701 sshd[8996]: Accepted publickey for core from 147.75.109.163 port 52862 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:24.450788 sshd[8996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:24.453162 systemd-logind[1463]: New session 18 of user core. Apr 12 20:51:24.453639 systemd[1]: Started session-18.scope. Apr 12 20:51:24.532142 sshd[8996]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:24.533526 systemd[1]: sshd@17-139.178.91.217:22-147.75.109.163:52862.service: Deactivated successfully. Apr 12 20:51:24.533975 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 20:51:24.534408 systemd-logind[1463]: Session 18 logged out. Waiting for processes to exit. Apr 12 20:51:24.534940 systemd-logind[1463]: Removed session 18. Apr 12 20:51:24.449000 audit[8996]: CRED_ACQ pid=8996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.630167 kernel: audit: type=1101 audit(1712955084.447:1683): pid=8996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.630207 kernel: audit: type=1103 audit(1712955084.449:1684): pid=8996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.630224 kernel: audit: type=1006 audit(1712955084.449:1685): pid=8996 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 20:51:24.688626 kernel: audit: type=1300 audit(1712955084.449:1685): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80da0980 a2=3 a3=0 items=0 ppid=1 pid=8996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:24.449000 audit[8996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80da0980 a2=3 a3=0 items=0 ppid=1 pid=8996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:24.780466 kernel: audit: type=1327 audit(1712955084.449:1685): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:24.449000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:24.810921 kernel: audit: type=1105 audit(1712955084.455:1686): pid=8996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.455000 audit[8996]: USER_START pid=8996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.905287 kernel: audit: type=1103 audit(1712955084.455:1687): pid=8998 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.455000 audit[8998]: CRED_ACQ pid=8998 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.994309 kernel: audit: type=1106 audit(1712955084.532:1688): pid=8996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.532000 audit[8996]: USER_END pid=8996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.532000 audit[8996]: CRED_DISP pid=8996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:25.178737 kernel: audit: type=1104 audit(1712955084.532:1689): pid=8996 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:24.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.91.217:22-147.75.109.163:52862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:29.543942 systemd[1]: Started sshd@18-139.178.91.217:22-147.75.109.163:50462.service. Apr 12 20:51:29.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.217:22-147.75.109.163:50462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:29.571338 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:51:29.571417 kernel: audit: type=1130 audit(1712955089.543:1691): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.217:22-147.75.109.163:50462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:29.689000 audit[9045]: USER_ACCT pid=9045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.689936 sshd[9045]: Accepted publickey for core from 147.75.109.163 port 50462 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:29.691046 sshd[9045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:29.693769 systemd-logind[1463]: New session 19 of user core. Apr 12 20:51:29.694856 systemd[1]: Started session-19.scope. Apr 12 20:51:29.774816 sshd[9045]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:29.778031 systemd[1]: sshd@18-139.178.91.217:22-147.75.109.163:50462.service: Deactivated successfully. Apr 12 20:51:29.778746 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 20:51:29.779421 systemd-logind[1463]: Session 19 logged out. Waiting for processes to exit. Apr 12 20:51:29.780821 systemd[1]: Started sshd@19-139.178.91.217:22-147.75.109.163:50474.service. Apr 12 20:51:29.690000 audit[9045]: CRED_ACQ pid=9045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.781525 systemd-logind[1463]: Removed session 19. Apr 12 20:51:29.871428 kernel: audit: type=1101 audit(1712955089.689:1692): pid=9045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.871465 kernel: audit: type=1103 audit(1712955089.690:1693): pid=9045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.871488 kernel: audit: type=1006 audit(1712955089.690:1694): pid=9045 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 20:51:29.929960 kernel: audit: type=1300 audit(1712955089.690:1694): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7ec2c930 a2=3 a3=0 items=0 ppid=1 pid=9045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:29.690000 audit[9045]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7ec2c930 a2=3 a3=0 items=0 ppid=1 pid=9045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:29.959582 sshd[9069]: Accepted publickey for core from 147.75.109.163 port 50474 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:29.961039 sshd[9069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:29.963830 systemd-logind[1463]: New session 20 of user core. Apr 12 20:51:29.965296 systemd[1]: Started session-20.scope. Apr 12 20:51:29.690000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:30.052327 kernel: audit: type=1327 audit(1712955089.690:1694): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:30.052378 kernel: audit: type=1105 audit(1712955089.696:1695): pid=9045 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.696000 audit[9045]: USER_START pid=9045 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.146700 kernel: audit: type=1103 audit(1712955089.697:1696): pid=9047 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.697000 audit[9047]: CRED_ACQ pid=9047 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.177755 sshd[9069]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:30.179509 systemd[1]: sshd@19-139.178.91.217:22-147.75.109.163:50474.service: Deactivated successfully. Apr 12 20:51:30.179867 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 20:51:30.180193 systemd-logind[1463]: Session 20 logged out. Waiting for processes to exit. Apr 12 20:51:30.180865 systemd[1]: Started sshd@20-139.178.91.217:22-147.75.109.163:50476.service. Apr 12 20:51:30.181235 systemd-logind[1463]: Removed session 20. Apr 12 20:51:30.235870 kernel: audit: type=1106 audit(1712955089.774:1697): pid=9045 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.774000 audit[9045]: USER_END pid=9045 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.331403 kernel: audit: type=1104 audit(1712955089.774:1698): pid=9045 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.774000 audit[9045]: CRED_DISP pid=9045 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.360731 sshd[9091]: Accepted publickey for core from 147.75.109.163 port 50476 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:30.361498 sshd[9091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:30.363685 systemd-logind[1463]: New session 21 of user core. Apr 12 20:51:30.364370 systemd[1]: Started session-21.scope. Apr 12 20:51:29.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.91.217:22-147.75.109.163:50462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:29.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.217:22-147.75.109.163:50474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:29.958000 audit[9069]: USER_ACCT pid=9069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.960000 audit[9069]: CRED_ACQ pid=9069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.960000 audit[9069]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe17b9cbb0 a2=3 a3=0 items=0 ppid=1 pid=9069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:29.960000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:29.967000 audit[9069]: USER_START pid=9069 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:29.967000 audit[9071]: CRED_ACQ pid=9071 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.177000 audit[9069]: USER_END pid=9069 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.177000 audit[9069]: CRED_DISP pid=9069 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.91.217:22-147.75.109.163:50474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:30.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.217:22-147.75.109.163:50476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:30.359000 audit[9091]: USER_ACCT pid=9091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.360000 audit[9091]: CRED_ACQ pid=9091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.360000 audit[9091]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecc2ac4c0 a2=3 a3=0 items=0 ppid=1 pid=9091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:30.360000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:30.365000 audit[9091]: USER_START pid=9091 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:30.366000 audit[9093]: CRED_ACQ pid=9093 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.246000 audit[9139]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=9139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:31.246000 audit[9139]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffeeaacd850 a2=0 a3=7ffeeaacd83c items=0 ppid=2840 pid=9139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:31.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:31.253569 sshd[9091]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:31.253000 audit[9091]: USER_END pid=9091 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.253000 audit[9091]: CRED_DISP pid=9091 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.255585 systemd[1]: sshd@20-139.178.91.217:22-147.75.109.163:50476.service: Deactivated successfully. Apr 12 20:51:31.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.91.217:22-147.75.109.163:50476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:31.256098 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 20:51:31.256535 systemd-logind[1463]: Session 21 logged out. Waiting for processes to exit. Apr 12 20:51:31.256000 audit[9139]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=9139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:31.256000 audit[9139]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeeaacd850 a2=0 a3=0 items=0 ppid=2840 pid=9139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:31.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:31.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.217:22-147.75.109.163:50490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:31.257344 systemd[1]: Started sshd@21-139.178.91.217:22-147.75.109.163:50490.service. Apr 12 20:51:31.257802 systemd-logind[1463]: Removed session 21. Apr 12 20:51:31.277000 audit[9146]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=9146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:31.277000 audit[9146]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc43625b20 a2=0 a3=7ffc43625b0c items=0 ppid=2840 pid=9146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:31.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:31.277000 audit[9146]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=9146 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:31.277000 audit[9146]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc43625b20 a2=0 a3=0 items=0 ppid=2840 pid=9146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:31.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:31.317000 audit[9142]: USER_ACCT pid=9142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.318814 sshd[9142]: Accepted publickey for core from 147.75.109.163 port 50490 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:31.320000 audit[9142]: CRED_ACQ pid=9142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.320000 audit[9142]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc29fd850 a2=3 a3=0 items=0 ppid=1 pid=9142 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:31.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:31.322191 sshd[9142]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:31.333411 systemd-logind[1463]: New session 22 of user core. Apr 12 20:51:31.336194 systemd[1]: Started session-22.scope. Apr 12 20:51:31.352000 audit[9142]: USER_START pid=9142 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.355000 audit[9149]: CRED_ACQ pid=9149 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.590878 sshd[9142]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:31.590000 audit[9142]: USER_END pid=9142 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.590000 audit[9142]: CRED_DISP pid=9142 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.592675 systemd[1]: sshd@21-139.178.91.217:22-147.75.109.163:50490.service: Deactivated successfully. Apr 12 20:51:31.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.91.217:22-147.75.109.163:50490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:31.593018 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 20:51:31.593361 systemd-logind[1463]: Session 22 logged out. Waiting for processes to exit. Apr 12 20:51:31.593984 systemd[1]: Started sshd@22-139.178.91.217:22-147.75.109.163:50500.service. Apr 12 20:51:31.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.217:22-147.75.109.163:50500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:31.594442 systemd-logind[1463]: Removed session 22. Apr 12 20:51:31.628000 audit[9171]: USER_ACCT pid=9171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.629620 sshd[9171]: Accepted publickey for core from 147.75.109.163 port 50500 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:31.630000 audit[9171]: CRED_ACQ pid=9171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.631000 audit[9171]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd8d5df50 a2=3 a3=0 items=0 ppid=1 pid=9171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:31.631000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:31.632848 sshd[9171]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:31.643458 systemd-logind[1463]: New session 23 of user core. Apr 12 20:51:31.646111 systemd[1]: Started session-23.scope. Apr 12 20:51:31.661000 audit[9171]: USER_START pid=9171 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.665000 audit[9173]: CRED_ACQ pid=9173 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.792771 sshd[9171]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:31.792000 audit[9171]: USER_END pid=9171 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.792000 audit[9171]: CRED_DISP pid=9171 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:31.794363 systemd[1]: sshd@22-139.178.91.217:22-147.75.109.163:50500.service: Deactivated successfully. Apr 12 20:51:31.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.91.217:22-147.75.109.163:50500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:31.794902 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 20:51:31.795375 systemd-logind[1463]: Session 23 logged out. Waiting for processes to exit. Apr 12 20:51:31.795947 systemd-logind[1463]: Removed session 23. Apr 12 20:51:36.802880 systemd[1]: Started sshd@23-139.178.91.217:22-147.75.109.163:50504.service. Apr 12 20:51:36.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.217:22-147.75.109.163:50504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:36.829721 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 20:51:36.829798 kernel: audit: type=1130 audit(1712955096.802:1740): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.217:22-147.75.109.163:50504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:36.948000 audit[9240]: USER_ACCT pid=9240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:36.949292 sshd[9240]: Accepted publickey for core from 147.75.109.163 port 50504 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:36.950211 sshd[9240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:36.952473 systemd-logind[1463]: New session 24 of user core. Apr 12 20:51:36.953086 systemd[1]: Started session-24.scope. Apr 12 20:51:37.032327 sshd[9240]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:37.033709 systemd[1]: sshd@23-139.178.91.217:22-147.75.109.163:50504.service: Deactivated successfully. Apr 12 20:51:37.034164 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 20:51:37.034565 systemd-logind[1463]: Session 24 logged out. Waiting for processes to exit. Apr 12 20:51:37.035178 systemd-logind[1463]: Removed session 24. Apr 12 20:51:36.949000 audit[9240]: CRED_ACQ pid=9240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.132292 kernel: audit: type=1101 audit(1712955096.948:1741): pid=9240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.132335 kernel: audit: type=1103 audit(1712955096.949:1742): pid=9240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.132356 kernel: audit: type=1006 audit(1712955096.949:1743): pid=9240 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 20:51:37.190818 kernel: audit: type=1300 audit(1712955096.949:1743): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80b6daa0 a2=3 a3=0 items=0 ppid=1 pid=9240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:36.949000 audit[9240]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80b6daa0 a2=3 a3=0 items=0 ppid=1 pid=9240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:37.282760 kernel: audit: type=1327 audit(1712955096.949:1743): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:36.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:37.313367 kernel: audit: type=1105 audit(1712955096.954:1744): pid=9240 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:36.954000 audit[9240]: USER_START pid=9240 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.407795 kernel: audit: type=1103 audit(1712955096.955:1745): pid=9242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:36.955000 audit[9242]: CRED_ACQ pid=9242 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.497005 kernel: audit: type=1106 audit(1712955097.032:1746): pid=9240 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.032000 audit[9240]: USER_END pid=9240 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.032000 audit[9240]: CRED_DISP pid=9240 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.681809 kernel: audit: type=1104 audit(1712955097.032:1747): pid=9240 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:37.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.91.217:22-147.75.109.163:50504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:37.408000 audit[9265]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=9265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:37.408000 audit[9265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe8eb4b6f0 a2=0 a3=7ffe8eb4b6dc items=0 ppid=2840 pid=9265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:37.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:37.409000 audit[9265]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=9265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:37.409000 audit[9265]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe8eb4b6f0 a2=0 a3=7ffe8eb4b6dc items=0 ppid=2840 pid=9265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:37.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:42.044808 systemd[1]: Started sshd@24-139.178.91.217:22-147.75.109.163:59294.service. Apr 12 20:51:42.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.217:22-147.75.109.163:59294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:42.072135 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 20:51:42.072193 kernel: audit: type=1130 audit(1712955102.044:1751): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.217:22-147.75.109.163:59294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:42.190000 audit[9284]: USER_ACCT pid=9284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.191890 sshd[9284]: Accepted publickey for core from 147.75.109.163 port 59294 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:42.193476 sshd[9284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:42.195951 systemd-logind[1463]: New session 25 of user core. Apr 12 20:51:42.196654 systemd[1]: Started session-25.scope. Apr 12 20:51:42.273745 sshd[9284]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:42.275247 systemd[1]: sshd@24-139.178.91.217:22-147.75.109.163:59294.service: Deactivated successfully. Apr 12 20:51:42.275733 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 20:51:42.276093 systemd-logind[1463]: Session 25 logged out. Waiting for processes to exit. Apr 12 20:51:42.276827 systemd-logind[1463]: Removed session 25. Apr 12 20:51:42.192000 audit[9284]: CRED_ACQ pid=9284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.373590 kernel: audit: type=1101 audit(1712955102.190:1752): pid=9284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.373630 kernel: audit: type=1103 audit(1712955102.192:1753): pid=9284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.373651 kernel: audit: type=1006 audit(1712955102.192:1754): pid=9284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 20:51:42.432153 kernel: audit: type=1300 audit(1712955102.192:1754): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3fa2c430 a2=3 a3=0 items=0 ppid=1 pid=9284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:42.192000 audit[9284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3fa2c430 a2=3 a3=0 items=0 ppid=1 pid=9284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:42.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:42.554629 kernel: audit: type=1327 audit(1712955102.192:1754): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:42.554659 kernel: audit: type=1105 audit(1712955102.198:1755): pid=9284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.198000 audit[9284]: USER_START pid=9284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.649136 kernel: audit: type=1103 audit(1712955102.199:1756): pid=9286 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.199000 audit[9286]: CRED_ACQ pid=9286 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.738311 kernel: audit: type=1106 audit(1712955102.273:1757): pid=9284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.273000 audit[9284]: USER_END pid=9284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.833817 kernel: audit: type=1104 audit(1712955102.273:1758): pid=9284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.273000 audit[9284]: CRED_DISP pid=9284 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:42.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.91.217:22-147.75.109.163:59294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:47.287921 systemd[1]: Started sshd@25-139.178.91.217:22-147.75.109.163:59512.service. Apr 12 20:51:47.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.217:22-147.75.109.163:59512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:47.315159 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:51:47.315199 kernel: audit: type=1130 audit(1712955107.287:1760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.217:22-147.75.109.163:59512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:47.434000 audit[9335]: USER_ACCT pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.435228 sshd[9335]: Accepted publickey for core from 147.75.109.163 port 59512 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:47.436840 sshd[9335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:47.439501 systemd-logind[1463]: New session 26 of user core. Apr 12 20:51:47.440252 systemd[1]: Started session-26.scope. Apr 12 20:51:47.520688 sshd[9335]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:47.522174 systemd[1]: sshd@25-139.178.91.217:22-147.75.109.163:59512.service: Deactivated successfully. Apr 12 20:51:47.522629 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 20:51:47.523050 systemd-logind[1463]: Session 26 logged out. Waiting for processes to exit. Apr 12 20:51:47.523559 systemd-logind[1463]: Removed session 26. Apr 12 20:51:47.435000 audit[9335]: CRED_ACQ pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.616904 kernel: audit: type=1101 audit(1712955107.434:1761): pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.616958 kernel: audit: type=1103 audit(1712955107.435:1762): pid=9335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.616976 kernel: audit: type=1006 audit(1712955107.435:1763): pid=9335 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 20:51:47.675490 kernel: audit: type=1300 audit(1712955107.435:1763): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9dec5770 a2=3 a3=0 items=0 ppid=1 pid=9335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:47.435000 audit[9335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9dec5770 a2=3 a3=0 items=0 ppid=1 pid=9335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:47.767464 kernel: audit: type=1327 audit(1712955107.435:1763): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:47.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:47.797966 kernel: audit: type=1105 audit(1712955107.441:1764): pid=9335 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.441000 audit[9335]: USER_START pid=9335 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.892459 kernel: audit: type=1103 audit(1712955107.442:1765): pid=9340 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.442000 audit[9340]: CRED_ACQ pid=9340 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.981672 kernel: audit: type=1106 audit(1712955107.520:1766): pid=9335 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.520000 audit[9335]: USER_END pid=9335 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.520000 audit[9335]: CRED_DISP pid=9335 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:48.166526 kernel: audit: type=1104 audit(1712955107.520:1767): pid=9335 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:47.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.91.217:22-147.75.109.163:59512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:52.529224 systemd[1]: Started sshd@26-139.178.91.217:22-147.75.109.163:59528.service. Apr 12 20:51:52.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.217:22-147.75.109.163:59528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:52.555728 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:51:52.555766 kernel: audit: type=1130 audit(1712955112.528:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.217:22-147.75.109.163:59528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:51:52.673000 audit[9362]: USER_ACCT pid=9362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.674716 sshd[9362]: Accepted publickey for core from 147.75.109.163 port 59528 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:51:52.676377 sshd[9362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:51:52.678824 systemd-logind[1463]: New session 27 of user core. Apr 12 20:51:52.679515 systemd[1]: Started session-27.scope. Apr 12 20:51:52.757016 sshd[9362]: pam_unix(sshd:session): session closed for user core Apr 12 20:51:52.758480 systemd[1]: sshd@26-139.178.91.217:22-147.75.109.163:59528.service: Deactivated successfully. Apr 12 20:51:52.758971 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 20:51:52.759351 systemd-logind[1463]: Session 27 logged out. Waiting for processes to exit. Apr 12 20:51:52.759720 systemd-logind[1463]: Removed session 27. Apr 12 20:51:52.675000 audit[9362]: CRED_ACQ pid=9362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.856869 kernel: audit: type=1101 audit(1712955112.673:1770): pid=9362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.856913 kernel: audit: type=1103 audit(1712955112.675:1771): pid=9362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.856932 kernel: audit: type=1006 audit(1712955112.675:1772): pid=9362 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 20:51:52.915392 kernel: audit: type=1300 audit(1712955112.675:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05dab080 a2=3 a3=0 items=0 ppid=1 pid=9362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:52.675000 audit[9362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05dab080 a2=3 a3=0 items=0 ppid=1 pid=9362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:53.007328 kernel: audit: type=1327 audit(1712955112.675:1772): proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:52.675000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:51:53.037802 kernel: audit: type=1105 audit(1712955112.681:1773): pid=9362 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.681000 audit[9362]: USER_START pid=9362 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:53.132248 kernel: audit: type=1103 audit(1712955112.681:1774): pid=9364 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.681000 audit[9364]: CRED_ACQ pid=9364 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:53.221435 kernel: audit: type=1106 audit(1712955112.757:1775): pid=9362 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.757000 audit[9362]: USER_END pid=9362 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:53.316880 kernel: audit: type=1104 audit(1712955112.757:1776): pid=9362 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.757000 audit[9362]: CRED_DISP pid=9362 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:51:52.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.91.217:22-147.75.109.163:59528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'