Apr 12 21:28:48.556846 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 21:28:48.556859 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:28:48.556866 kernel: BIOS-provided physical RAM map: Apr 12 21:28:48.556870 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 21:28:48.556874 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 21:28:48.556877 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 21:28:48.556882 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 21:28:48.556886 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 21:28:48.556890 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820e1fff] usable Apr 12 21:28:48.556893 kernel: BIOS-e820: [mem 0x00000000820e2000-0x00000000820e2fff] ACPI NVS Apr 12 21:28:48.556898 kernel: BIOS-e820: [mem 0x00000000820e3000-0x00000000820e3fff] reserved Apr 12 21:28:48.556902 kernel: BIOS-e820: [mem 0x00000000820e4000-0x000000008afccfff] usable Apr 12 21:28:48.556906 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Apr 12 21:28:48.556910 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Apr 12 21:28:48.556915 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Apr 12 21:28:48.556920 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Apr 12 21:28:48.556924 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Apr 12 21:28:48.556928 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Apr 12 21:28:48.556932 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 21:28:48.556936 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 21:28:48.556940 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 21:28:48.556945 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 21:28:48.556949 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 21:28:48.556953 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Apr 12 21:28:48.556957 kernel: NX (Execute Disable) protection: active Apr 12 21:28:48.556961 kernel: SMBIOS 3.2.1 present. Apr 12 21:28:48.556966 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Apr 12 21:28:48.556971 kernel: tsc: Detected 3400.000 MHz processor Apr 12 21:28:48.556975 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 21:28:48.556979 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 21:28:48.556984 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 21:28:48.556988 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Apr 12 21:28:48.556993 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 21:28:48.556997 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Apr 12 21:28:48.557001 kernel: Using GB pages for direct mapping Apr 12 21:28:48.557006 kernel: ACPI: Early table checksum verification disabled Apr 12 21:28:48.557011 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 21:28:48.557015 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 21:28:48.557020 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Apr 12 21:28:48.557024 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 21:28:48.557030 kernel: ACPI: FACS 0x000000008C66CF80 000040 Apr 12 21:28:48.557035 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Apr 12 21:28:48.557040 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Apr 12 21:28:48.557045 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 21:28:48.557050 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 21:28:48.557055 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 21:28:48.557059 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 21:28:48.557064 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 21:28:48.557069 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 21:28:48.557073 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:28:48.557079 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 21:28:48.557084 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 21:28:48.557088 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:28:48.557093 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:28:48.557098 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 21:28:48.557102 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 21:28:48.557107 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:28:48.557112 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:28:48.557117 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 21:28:48.557122 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Apr 12 21:28:48.557127 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 21:28:48.557131 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 21:28:48.557136 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 21:28:48.557141 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Apr 12 21:28:48.557145 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 21:28:48.557150 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 21:28:48.557155 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 21:28:48.557160 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 21:28:48.557165 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 21:28:48.557170 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Apr 12 21:28:48.557174 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Apr 12 21:28:48.557179 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Apr 12 21:28:48.557184 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Apr 12 21:28:48.557188 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Apr 12 21:28:48.557193 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Apr 12 21:28:48.557198 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Apr 12 21:28:48.557203 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Apr 12 21:28:48.557208 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Apr 12 21:28:48.557212 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Apr 12 21:28:48.557217 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Apr 12 21:28:48.557222 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Apr 12 21:28:48.557226 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Apr 12 21:28:48.557231 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Apr 12 21:28:48.557238 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Apr 12 21:28:48.557244 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Apr 12 21:28:48.557248 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Apr 12 21:28:48.557253 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Apr 12 21:28:48.557271 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Apr 12 21:28:48.557276 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Apr 12 21:28:48.557280 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Apr 12 21:28:48.557285 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Apr 12 21:28:48.557289 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Apr 12 21:28:48.557294 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Apr 12 21:28:48.557299 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Apr 12 21:28:48.557304 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Apr 12 21:28:48.557308 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Apr 12 21:28:48.557313 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Apr 12 21:28:48.557317 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Apr 12 21:28:48.557322 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Apr 12 21:28:48.557326 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Apr 12 21:28:48.557331 kernel: No NUMA configuration found Apr 12 21:28:48.557335 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Apr 12 21:28:48.557341 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Apr 12 21:28:48.557346 kernel: Zone ranges: Apr 12 21:28:48.557350 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 21:28:48.557355 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 21:28:48.557359 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Apr 12 21:28:48.557364 kernel: Movable zone start for each node Apr 12 21:28:48.557368 kernel: Early memory node ranges Apr 12 21:28:48.557373 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 21:28:48.557378 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 21:28:48.557382 kernel: node 0: [mem 0x0000000040400000-0x00000000820e1fff] Apr 12 21:28:48.557388 kernel: node 0: [mem 0x00000000820e4000-0x000000008afccfff] Apr 12 21:28:48.557392 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Apr 12 21:28:48.557397 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Apr 12 21:28:48.557401 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Apr 12 21:28:48.557406 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Apr 12 21:28:48.557410 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 21:28:48.557418 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 21:28:48.557424 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 21:28:48.557429 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 21:28:48.557434 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Apr 12 21:28:48.557439 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Apr 12 21:28:48.557444 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Apr 12 21:28:48.557449 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Apr 12 21:28:48.557454 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 21:28:48.557459 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 21:28:48.557464 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 21:28:48.557469 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 21:28:48.557475 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 21:28:48.557479 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 21:28:48.557484 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 21:28:48.557489 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 21:28:48.557494 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 21:28:48.557499 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 21:28:48.557503 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 21:28:48.557508 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 21:28:48.557513 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 21:28:48.557519 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 21:28:48.557523 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 21:28:48.557528 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 21:28:48.557533 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 21:28:48.557538 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 21:28:48.557543 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 21:28:48.557548 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 21:28:48.557553 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 21:28:48.557557 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 21:28:48.557563 kernel: TSC deadline timer available Apr 12 21:28:48.557568 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 21:28:48.557573 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Apr 12 21:28:48.557578 kernel: Booting paravirtualized kernel on bare hardware Apr 12 21:28:48.557583 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 21:28:48.557588 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 21:28:48.557593 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 21:28:48.557598 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 21:28:48.557602 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 21:28:48.557608 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Apr 12 21:28:48.557613 kernel: Policy zone: Normal Apr 12 21:28:48.557619 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:28:48.557624 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 21:28:48.557628 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 21:28:48.557633 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 21:28:48.557638 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 21:28:48.557644 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 730116K reserved, 0K cma-reserved) Apr 12 21:28:48.557649 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 21:28:48.557654 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 21:28:48.557659 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 21:28:48.557664 kernel: rcu: Hierarchical RCU implementation. Apr 12 21:28:48.557669 kernel: rcu: RCU event tracing is enabled. Apr 12 21:28:48.557674 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 21:28:48.557679 kernel: Rude variant of Tasks RCU enabled. Apr 12 21:28:48.557684 kernel: Tracing variant of Tasks RCU enabled. Apr 12 21:28:48.557689 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 21:28:48.557695 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 21:28:48.557700 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 21:28:48.557704 kernel: random: crng init done Apr 12 21:28:48.557709 kernel: Console: colour dummy device 80x25 Apr 12 21:28:48.557714 kernel: printk: console [tty0] enabled Apr 12 21:28:48.557719 kernel: printk: console [ttyS1] enabled Apr 12 21:28:48.557724 kernel: ACPI: Core revision 20210730 Apr 12 21:28:48.557729 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Apr 12 21:28:48.557734 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 21:28:48.557739 kernel: DMAR: Host address width 39 Apr 12 21:28:48.557744 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 21:28:48.557749 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 21:28:48.557754 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Apr 12 21:28:48.557759 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Apr 12 21:28:48.557764 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 21:28:48.557769 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 21:28:48.557773 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 21:28:48.557778 kernel: x2apic enabled Apr 12 21:28:48.557784 kernel: Switched APIC routing to cluster x2apic. Apr 12 21:28:48.557789 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 21:28:48.557794 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 21:28:48.557799 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 21:28:48.557804 kernel: process: using mwait in idle threads Apr 12 21:28:48.557808 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 21:28:48.557813 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 21:28:48.557818 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 21:28:48.557823 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 21:28:48.557829 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 21:28:48.557833 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 21:28:48.557838 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 21:28:48.557843 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 21:28:48.557848 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 21:28:48.557852 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 21:28:48.557857 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 21:28:48.557862 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 21:28:48.557867 kernel: TAA: Mitigation: TSX disabled Apr 12 21:28:48.557872 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 21:28:48.557877 kernel: SRBDS: Mitigation: Microcode Apr 12 21:28:48.557882 kernel: GDS: Vulnerable: No microcode Apr 12 21:28:48.557887 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 21:28:48.557892 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 21:28:48.557897 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 21:28:48.557902 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 21:28:48.557906 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 21:28:48.557911 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 21:28:48.557916 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 21:28:48.557921 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 21:28:48.557925 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 21:28:48.557930 kernel: Freeing SMP alternatives memory: 32K Apr 12 21:28:48.557936 kernel: pid_max: default: 32768 minimum: 301 Apr 12 21:28:48.557941 kernel: LSM: Security Framework initializing Apr 12 21:28:48.557945 kernel: SELinux: Initializing. Apr 12 21:28:48.557950 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 21:28:48.557955 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 21:28:48.557960 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 21:28:48.557965 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 21:28:48.557969 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 21:28:48.557974 kernel: ... version: 4 Apr 12 21:28:48.557979 kernel: ... bit width: 48 Apr 12 21:28:48.557984 kernel: ... generic registers: 4 Apr 12 21:28:48.557990 kernel: ... value mask: 0000ffffffffffff Apr 12 21:28:48.557995 kernel: ... max period: 00007fffffffffff Apr 12 21:28:48.557999 kernel: ... fixed-purpose events: 3 Apr 12 21:28:48.558004 kernel: ... event mask: 000000070000000f Apr 12 21:28:48.558009 kernel: signal: max sigframe size: 2032 Apr 12 21:28:48.558014 kernel: rcu: Hierarchical SRCU implementation. Apr 12 21:28:48.558019 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 21:28:48.558024 kernel: smp: Bringing up secondary CPUs ... Apr 12 21:28:48.558028 kernel: x86: Booting SMP configuration: Apr 12 21:28:48.558034 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 21:28:48.558039 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 21:28:48.558044 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 21:28:48.558049 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 21:28:48.558054 kernel: smpboot: Max logical packages: 1 Apr 12 21:28:48.558059 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 21:28:48.558064 kernel: devtmpfs: initialized Apr 12 21:28:48.558068 kernel: x86/mm: Memory block size: 128MB Apr 12 21:28:48.558073 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820e2000-0x820e2fff] (4096 bytes) Apr 12 21:28:48.558079 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Apr 12 21:28:48.558084 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 21:28:48.558089 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 21:28:48.558094 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 21:28:48.558099 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 21:28:48.558103 kernel: audit: initializing netlink subsys (disabled) Apr 12 21:28:48.558108 kernel: audit: type=2000 audit(1712957323.041:1): state=initialized audit_enabled=0 res=1 Apr 12 21:28:48.558113 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 21:28:48.558118 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 21:28:48.558123 kernel: cpuidle: using governor menu Apr 12 21:28:48.558128 kernel: ACPI: bus type PCI registered Apr 12 21:28:48.558133 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 21:28:48.558138 kernel: dca service started, version 1.12.1 Apr 12 21:28:48.558143 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 21:28:48.558148 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 21:28:48.558153 kernel: PCI: Using configuration type 1 for base access Apr 12 21:28:48.558158 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 21:28:48.558162 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 21:28:48.558168 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 21:28:48.558173 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 21:28:48.558178 kernel: ACPI: Added _OSI(Module Device) Apr 12 21:28:48.558183 kernel: ACPI: Added _OSI(Processor Device) Apr 12 21:28:48.558187 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 21:28:48.558192 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 21:28:48.558197 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 21:28:48.558202 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 21:28:48.558207 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 21:28:48.558212 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 21:28:48.558217 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:28:48.558222 kernel: ACPI: SSDT 0xFFFF8C3980220200 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 21:28:48.558227 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 21:28:48.558232 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:28:48.558238 kernel: ACPI: SSDT 0xFFFF8C3981AEAC00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 21:28:48.558259 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:28:48.558264 kernel: ACPI: SSDT 0xFFFF8C3981A63800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 21:28:48.558269 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:28:48.558274 kernel: ACPI: SSDT 0xFFFF8C3981B50000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 21:28:48.558294 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:28:48.558299 kernel: ACPI: SSDT 0xFFFF8C3980157000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 21:28:48.558304 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:28:48.558309 kernel: ACPI: SSDT 0xFFFF8C3981AEC800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 21:28:48.558314 kernel: ACPI: Interpreter enabled Apr 12 21:28:48.558318 kernel: ACPI: PM: (supports S0 S5) Apr 12 21:28:48.558323 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 21:28:48.558328 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 21:28:48.558333 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 21:28:48.558338 kernel: HEST: Table parsing has been initialized. Apr 12 21:28:48.558343 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 21:28:48.558348 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 21:28:48.558353 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 21:28:48.558358 kernel: ACPI: PM: Power Resource [USBC] Apr 12 21:28:48.558363 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 21:28:48.558368 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 21:28:48.558372 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 21:28:48.558377 kernel: ACPI: PM: Power Resource [WRST] Apr 12 21:28:48.558383 kernel: ACPI: PM: Power Resource [FN00] Apr 12 21:28:48.558388 kernel: ACPI: PM: Power Resource [FN01] Apr 12 21:28:48.558392 kernel: ACPI: PM: Power Resource [FN02] Apr 12 21:28:48.558397 kernel: ACPI: PM: Power Resource [FN03] Apr 12 21:28:48.558402 kernel: ACPI: PM: Power Resource [FN04] Apr 12 21:28:48.558407 kernel: ACPI: PM: Power Resource [PIN] Apr 12 21:28:48.558411 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 21:28:48.558474 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:28:48.558521 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 21:28:48.558562 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 21:28:48.558569 kernel: PCI host bridge to bus 0000:00 Apr 12 21:28:48.558614 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 21:28:48.558652 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 21:28:48.558689 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 21:28:48.558725 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Apr 12 21:28:48.558762 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 21:28:48.558799 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 21:28:48.558849 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 21:28:48.558899 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 21:28:48.558943 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.558988 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 21:28:48.559032 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Apr 12 21:28:48.559078 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 21:28:48.559119 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Apr 12 21:28:48.559166 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 21:28:48.559208 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Apr 12 21:28:48.559273 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 21:28:48.559322 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 21:28:48.559366 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Apr 12 21:28:48.559408 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Apr 12 21:28:48.559454 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 21:28:48.559497 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:28:48.559544 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 21:28:48.559589 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:28:48.559634 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 21:28:48.559677 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Apr 12 21:28:48.559718 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 21:28:48.559764 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 21:28:48.559806 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Apr 12 21:28:48.559848 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 21:28:48.559894 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 21:28:48.559937 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Apr 12 21:28:48.559979 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 21:28:48.560025 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 21:28:48.560067 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Apr 12 21:28:48.560110 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Apr 12 21:28:48.560157 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Apr 12 21:28:48.560201 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Apr 12 21:28:48.560245 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Apr 12 21:28:48.560304 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Apr 12 21:28:48.560345 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 21:28:48.560391 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 21:28:48.560433 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.560480 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 21:28:48.560524 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.560571 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 21:28:48.560614 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.560659 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 21:28:48.560703 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.560750 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Apr 12 21:28:48.560794 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.560842 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 21:28:48.560884 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:28:48.560931 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 21:28:48.560976 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 21:28:48.561019 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Apr 12 21:28:48.561060 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 21:28:48.561107 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 21:28:48.561148 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 21:28:48.561198 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 21:28:48.561244 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 21:28:48.561324 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Apr 12 21:28:48.561368 kernel: pci 0000:01:00.0: PME# supported from D3cold Apr 12 21:28:48.561411 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 21:28:48.561454 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:28:48.561501 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 21:28:48.561546 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 21:28:48.561589 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Apr 12 21:28:48.561632 kernel: pci 0000:01:00.1: PME# supported from D3cold Apr 12 21:28:48.561674 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 21:28:48.561719 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:28:48.561761 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:28:48.561804 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 21:28:48.561847 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:28:48.561889 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 21:28:48.561938 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Apr 12 21:28:48.561982 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Apr 12 21:28:48.562024 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Apr 12 21:28:48.562067 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 21:28:48.562111 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Apr 12 21:28:48.562153 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.562198 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 21:28:48.562263 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 21:28:48.562326 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 21:28:48.562373 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 21:28:48.562417 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 21:28:48.562459 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Apr 12 21:28:48.562503 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 21:28:48.562547 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Apr 12 21:28:48.562590 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:28:48.562631 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 21:28:48.562673 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 21:28:48.562714 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 21:28:48.562756 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 21:28:48.562803 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 21:28:48.562847 kernel: pci 0000:06:00.0: enabling Extended Tags Apr 12 21:28:48.562892 kernel: pci 0000:06:00.0: supports D1 D2 Apr 12 21:28:48.562935 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:28:48.562977 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 21:28:48.563021 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 21:28:48.563119 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:28:48.563170 kernel: pci_bus 0000:07: extended config space not accessible Apr 12 21:28:48.563220 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 21:28:48.563272 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Apr 12 21:28:48.563335 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Apr 12 21:28:48.563380 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 21:28:48.563424 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 21:28:48.563470 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 21:28:48.563514 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:28:48.563558 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 21:28:48.563603 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 21:28:48.563647 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:28:48.563655 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 21:28:48.563660 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 21:28:48.563667 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 21:28:48.563672 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 21:28:48.563677 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 21:28:48.563682 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 21:28:48.563688 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 21:28:48.563694 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 21:28:48.563699 kernel: iommu: Default domain type: Translated Apr 12 21:28:48.563704 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 21:28:48.563747 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Apr 12 21:28:48.563794 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 21:28:48.563838 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Apr 12 21:28:48.563846 kernel: vgaarb: loaded Apr 12 21:28:48.563851 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 21:28:48.563856 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 21:28:48.563863 kernel: PTP clock support registered Apr 12 21:28:48.563868 kernel: PCI: Using ACPI for IRQ routing Apr 12 21:28:48.563873 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 21:28:48.563879 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 21:28:48.563884 kernel: e820: reserve RAM buffer [mem 0x820e2000-0x83ffffff] Apr 12 21:28:48.563889 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Apr 12 21:28:48.563894 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Apr 12 21:28:48.563899 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Apr 12 21:28:48.563904 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Apr 12 21:28:48.563910 kernel: clocksource: Switched to clocksource tsc-early Apr 12 21:28:48.563915 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 21:28:48.563921 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 21:28:48.563926 kernel: pnp: PnP ACPI init Apr 12 21:28:48.563971 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 21:28:48.564012 kernel: pnp 00:02: [dma 0 disabled] Apr 12 21:28:48.564053 kernel: pnp 00:03: [dma 0 disabled] Apr 12 21:28:48.564098 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 21:28:48.564136 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 21:28:48.564177 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 21:28:48.564217 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 21:28:48.564282 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 21:28:48.564339 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 21:28:48.564379 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 21:28:48.564416 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 21:28:48.564453 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 21:28:48.564490 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 21:28:48.564527 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 21:28:48.564568 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 21:28:48.564605 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 21:28:48.564645 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 21:28:48.564681 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 21:28:48.564719 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 21:28:48.564755 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 21:28:48.564793 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 21:28:48.564833 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 21:28:48.564841 kernel: pnp: PnP ACPI: found 10 devices Apr 12 21:28:48.564847 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 21:28:48.564853 kernel: NET: Registered PF_INET protocol family Apr 12 21:28:48.564858 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:28:48.564864 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 21:28:48.564869 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 21:28:48.564874 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:28:48.564880 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 21:28:48.564885 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 21:28:48.564890 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 21:28:48.564896 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 21:28:48.564902 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 21:28:48.564907 kernel: NET: Registered PF_XDP protocol family Apr 12 21:28:48.564948 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Apr 12 21:28:48.564990 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Apr 12 21:28:48.565031 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Apr 12 21:28:48.565077 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 21:28:48.565120 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 21:28:48.565167 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 21:28:48.565210 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 21:28:48.565281 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:28:48.565343 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 21:28:48.565384 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:28:48.565426 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 21:28:48.565469 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 21:28:48.565512 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 21:28:48.565553 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 21:28:48.565595 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 21:28:48.565637 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 21:28:48.565679 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 21:28:48.565721 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 21:28:48.565766 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 21:28:48.565809 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 21:28:48.565851 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:28:48.565893 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 21:28:48.565934 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 21:28:48.565977 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:28:48.566015 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 21:28:48.566052 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 21:28:48.566090 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 21:28:48.566127 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 21:28:48.566164 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Apr 12 21:28:48.566200 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 21:28:48.566270 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Apr 12 21:28:48.566331 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:28:48.566376 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Apr 12 21:28:48.566417 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Apr 12 21:28:48.566460 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Apr 12 21:28:48.566499 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Apr 12 21:28:48.566542 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Apr 12 21:28:48.566581 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Apr 12 21:28:48.566622 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 21:28:48.566663 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Apr 12 21:28:48.566671 kernel: PCI: CLS 64 bytes, default 64 Apr 12 21:28:48.566677 kernel: DMAR: No ATSR found Apr 12 21:28:48.566682 kernel: DMAR: No SATC found Apr 12 21:28:48.566687 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 21:28:48.566729 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 21:28:48.566772 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 21:28:48.566815 kernel: pci 0000:00:08.0: Adding to iommu group 2 Apr 12 21:28:48.566856 kernel: pci 0000:00:12.0: Adding to iommu group 3 Apr 12 21:28:48.566901 kernel: pci 0000:00:14.0: Adding to iommu group 4 Apr 12 21:28:48.566942 kernel: pci 0000:00:14.2: Adding to iommu group 4 Apr 12 21:28:48.566984 kernel: pci 0000:00:15.0: Adding to iommu group 5 Apr 12 21:28:48.567024 kernel: pci 0000:00:15.1: Adding to iommu group 5 Apr 12 21:28:48.567065 kernel: pci 0000:00:16.0: Adding to iommu group 6 Apr 12 21:28:48.567107 kernel: pci 0000:00:16.1: Adding to iommu group 6 Apr 12 21:28:48.567148 kernel: pci 0000:00:16.4: Adding to iommu group 6 Apr 12 21:28:48.567189 kernel: pci 0000:00:17.0: Adding to iommu group 7 Apr 12 21:28:48.567230 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Apr 12 21:28:48.567320 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Apr 12 21:28:48.567362 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Apr 12 21:28:48.567404 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Apr 12 21:28:48.567445 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Apr 12 21:28:48.567486 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Apr 12 21:28:48.567527 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Apr 12 21:28:48.567569 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Apr 12 21:28:48.567611 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Apr 12 21:28:48.567655 kernel: pci 0000:01:00.0: Adding to iommu group 1 Apr 12 21:28:48.567699 kernel: pci 0000:01:00.1: Adding to iommu group 1 Apr 12 21:28:48.567742 kernel: pci 0000:03:00.0: Adding to iommu group 15 Apr 12 21:28:48.567786 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 21:28:48.567829 kernel: pci 0000:06:00.0: Adding to iommu group 17 Apr 12 21:28:48.567874 kernel: pci 0000:07:00.0: Adding to iommu group 17 Apr 12 21:28:48.567882 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 21:28:48.567888 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 21:28:48.567894 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Apr 12 21:28:48.567899 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Apr 12 21:28:48.567905 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 21:28:48.567910 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 21:28:48.567915 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 21:28:48.567960 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 21:28:48.567968 kernel: Initialise system trusted keyrings Apr 12 21:28:48.567973 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 21:28:48.567980 kernel: Key type asymmetric registered Apr 12 21:28:48.567985 kernel: Asymmetric key parser 'x509' registered Apr 12 21:28:48.567990 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 21:28:48.567996 kernel: io scheduler mq-deadline registered Apr 12 21:28:48.568001 kernel: io scheduler kyber registered Apr 12 21:28:48.568006 kernel: io scheduler bfq registered Apr 12 21:28:48.568047 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Apr 12 21:28:48.568090 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Apr 12 21:28:48.568132 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Apr 12 21:28:48.568177 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Apr 12 21:28:48.568218 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Apr 12 21:28:48.568287 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Apr 12 21:28:48.568334 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 21:28:48.568341 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 21:28:48.568347 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 21:28:48.568353 kernel: pstore: Registered erst as persistent store backend Apr 12 21:28:48.568359 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 21:28:48.568365 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 21:28:48.568370 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 21:28:48.568375 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 21:28:48.568381 kernel: hpet_acpi_add: no address or irqs in _CRS Apr 12 21:28:48.568426 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 21:28:48.568434 kernel: i8042: PNP: No PS/2 controller found. Apr 12 21:28:48.568472 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 21:28:48.568511 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 21:28:48.568552 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T21:28:47 UTC (1712957327) Apr 12 21:28:48.568592 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 21:28:48.568599 kernel: fail to initialize ptp_kvm Apr 12 21:28:48.568604 kernel: intel_pstate: Intel P-state driver initializing Apr 12 21:28:48.568610 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 21:28:48.568615 kernel: intel_pstate: HWP enabled Apr 12 21:28:48.568621 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 21:28:48.568626 kernel: vesafb: scrolling: redraw Apr 12 21:28:48.568632 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 21:28:48.568638 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000003588488c, using 768k, total 768k Apr 12 21:28:48.568643 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 21:28:48.568649 kernel: fb0: VESA VGA frame buffer device Apr 12 21:28:48.568654 kernel: NET: Registered PF_INET6 protocol family Apr 12 21:28:48.568659 kernel: Segment Routing with IPv6 Apr 12 21:28:48.568664 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 21:28:48.568670 kernel: NET: Registered PF_PACKET protocol family Apr 12 21:28:48.568675 kernel: Key type dns_resolver registered Apr 12 21:28:48.568681 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 21:28:48.568687 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 21:28:48.568692 kernel: IPI shorthand broadcast: enabled Apr 12 21:28:48.568697 kernel: sched_clock: Marking stable (1681856747, 1339933598)->(4465541167, -1443750822) Apr 12 21:28:48.568703 kernel: registered taskstats version 1 Apr 12 21:28:48.568708 kernel: Loading compiled-in X.509 certificates Apr 12 21:28:48.568713 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 21:28:48.568718 kernel: Key type .fscrypt registered Apr 12 21:28:48.568724 kernel: Key type fscrypt-provisioning registered Apr 12 21:28:48.568730 kernel: pstore: Using crash dump compression: deflate Apr 12 21:28:48.568735 kernel: ima: Allocated hash algorithm: sha1 Apr 12 21:28:48.568741 kernel: ima: No architecture policies found Apr 12 21:28:48.568746 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 21:28:48.568752 kernel: Write protecting the kernel read-only data: 28672k Apr 12 21:28:48.568757 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 21:28:48.568762 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 21:28:48.568767 kernel: Run /init as init process Apr 12 21:28:48.568773 kernel: with arguments: Apr 12 21:28:48.568779 kernel: /init Apr 12 21:28:48.568784 kernel: with environment: Apr 12 21:28:48.568789 kernel: HOME=/ Apr 12 21:28:48.568794 kernel: TERM=linux Apr 12 21:28:48.568799 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 21:28:48.568806 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:28:48.568813 systemd[1]: Detected architecture x86-64. Apr 12 21:28:48.568819 systemd[1]: Running in initrd. Apr 12 21:28:48.568825 systemd[1]: No hostname configured, using default hostname. Apr 12 21:28:48.568830 systemd[1]: Hostname set to . Apr 12 21:28:48.568835 systemd[1]: Initializing machine ID from random generator. Apr 12 21:28:48.568841 systemd[1]: Queued start job for default target initrd.target. Apr 12 21:28:48.568846 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:28:48.568852 systemd[1]: Reached target cryptsetup.target. Apr 12 21:28:48.568857 systemd[1]: Reached target paths.target. Apr 12 21:28:48.568863 systemd[1]: Reached target slices.target. Apr 12 21:28:48.568869 systemd[1]: Reached target swap.target. Apr 12 21:28:48.568874 systemd[1]: Reached target timers.target. Apr 12 21:28:48.568880 systemd[1]: Listening on iscsid.socket. Apr 12 21:28:48.568885 systemd[1]: Listening on iscsiuio.socket. Apr 12 21:28:48.568891 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 21:28:48.568896 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 21:28:48.568902 systemd[1]: Listening on systemd-journald.socket. Apr 12 21:28:48.568908 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Apr 12 21:28:48.568914 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Apr 12 21:28:48.568919 systemd[1]: Listening on systemd-networkd.socket. Apr 12 21:28:48.568925 kernel: clocksource: Switched to clocksource tsc Apr 12 21:28:48.568930 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:28:48.568936 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:28:48.568941 systemd[1]: Reached target sockets.target. Apr 12 21:28:48.568947 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:28:48.568952 systemd[1]: Finished network-cleanup.service. Apr 12 21:28:48.568959 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 21:28:48.568964 systemd[1]: Starting systemd-journald.service... Apr 12 21:28:48.568970 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:28:48.568977 systemd-journald[267]: Journal started Apr 12 21:28:48.569003 systemd-journald[267]: Runtime Journal (/run/log/journal/461ed37599334a4397510c38269ffbf6) is 8.0M, max 640.1M, 632.1M free. Apr 12 21:28:48.572028 systemd-modules-load[268]: Inserted module 'overlay' Apr 12 21:28:48.631352 kernel: audit: type=1334 audit(1712957328.577:2): prog-id=6 op=LOAD Apr 12 21:28:48.631363 systemd[1]: Starting systemd-resolved.service... Apr 12 21:28:48.631371 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 21:28:48.577000 audit: BPF prog-id=6 op=LOAD Apr 12 21:28:48.667288 kernel: Bridge firewalling registered Apr 12 21:28:48.667321 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 21:28:48.682442 systemd-modules-load[268]: Inserted module 'br_netfilter' Apr 12 21:28:48.717341 systemd[1]: Started systemd-journald.service. Apr 12 21:28:48.717353 kernel: SCSI subsystem initialized Apr 12 21:28:48.684686 systemd-resolved[270]: Positive Trust Anchors: Apr 12 21:28:48.762476 kernel: audit: type=1130 audit(1712957328.720:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.684691 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 21:28:48.876321 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 21:28:48.876334 kernel: audit: type=1130 audit(1712957328.782:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.876344 kernel: device-mapper: uevent: version 1.0.3 Apr 12 21:28:48.876351 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 21:28:48.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.684709 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 21:28:48.950457 kernel: audit: type=1130 audit(1712957328.885:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.686263 systemd-resolved[270]: Defaulting to hostname 'linux'. Apr 12 21:28:49.002306 kernel: audit: type=1130 audit(1712957328.959:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.721386 systemd[1]: Started systemd-resolved.service. Apr 12 21:28:49.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.783411 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:28:49.109715 kernel: audit: type=1130 audit(1712957329.010:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.109725 kernel: audit: type=1130 audit(1712957329.063:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:48.878041 systemd-modules-load[268]: Inserted module 'dm_multipath' Apr 12 21:28:48.885545 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 21:28:48.959536 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:28:49.010543 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 21:28:49.063530 systemd[1]: Reached target nss-lookup.target. Apr 12 21:28:49.118847 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 21:28:49.140842 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:28:49.141132 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 21:28:49.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.143963 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 21:28:49.144584 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:28:49.256080 kernel: audit: type=1130 audit(1712957329.143:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.256094 kernel: audit: type=1130 audit(1712957329.207:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.207581 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 21:28:49.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.264951 systemd[1]: Starting dracut-cmdline.service... Apr 12 21:28:49.287364 dracut-cmdline[291]: dracut-dracut-053 Apr 12 21:28:49.287364 dracut-cmdline[291]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 21:28:49.287364 dracut-cmdline[291]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:28:49.359275 kernel: Loading iSCSI transport class v2.0-870. Apr 12 21:28:49.359287 kernel: iscsi: registered transport (tcp) Apr 12 21:28:49.415205 kernel: iscsi: registered transport (qla4xxx) Apr 12 21:28:49.415223 kernel: QLogic iSCSI HBA Driver Apr 12 21:28:49.431357 systemd[1]: Finished dracut-cmdline.service. Apr 12 21:28:49.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:49.439945 systemd[1]: Starting dracut-pre-udev.service... Apr 12 21:28:49.497311 kernel: raid6: avx2x4 gen() 42552 MB/s Apr 12 21:28:49.533313 kernel: raid6: avx2x4 xor() 20801 MB/s Apr 12 21:28:49.569269 kernel: raid6: avx2x2 gen() 52352 MB/s Apr 12 21:28:49.604315 kernel: raid6: avx2x2 xor() 32079 MB/s Apr 12 21:28:49.639317 kernel: raid6: avx2x1 gen() 45240 MB/s Apr 12 21:28:49.673268 kernel: raid6: avx2x1 xor() 27911 MB/s Apr 12 21:28:49.707314 kernel: raid6: sse2x4 gen() 21341 MB/s Apr 12 21:28:49.741313 kernel: raid6: sse2x4 xor() 11983 MB/s Apr 12 21:28:49.775313 kernel: raid6: sse2x2 gen() 21650 MB/s Apr 12 21:28:49.809313 kernel: raid6: sse2x2 xor() 13373 MB/s Apr 12 21:28:49.843273 kernel: raid6: sse2x1 gen() 18247 MB/s Apr 12 21:28:49.894695 kernel: raid6: sse2x1 xor() 8916 MB/s Apr 12 21:28:49.894711 kernel: raid6: using algorithm avx2x2 gen() 52352 MB/s Apr 12 21:28:49.894718 kernel: raid6: .... xor() 32079 MB/s, rmw enabled Apr 12 21:28:49.912657 kernel: raid6: using avx2x2 recovery algorithm Apr 12 21:28:49.958271 kernel: xor: automatically using best checksumming function avx Apr 12 21:28:50.036297 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 21:28:50.041676 systemd[1]: Finished dracut-pre-udev.service. Apr 12 21:28:50.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:50.051000 audit: BPF prog-id=7 op=LOAD Apr 12 21:28:50.051000 audit: BPF prog-id=8 op=LOAD Apr 12 21:28:50.052140 systemd[1]: Starting systemd-udevd.service... Apr 12 21:28:50.060361 systemd-udevd[473]: Using default interface naming scheme 'v252'. Apr 12 21:28:50.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:50.065390 systemd[1]: Started systemd-udevd.service. Apr 12 21:28:50.108369 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Apr 12 21:28:50.082862 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 21:28:50.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:50.113368 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 21:28:50.127657 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:28:50.179260 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:28:50.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:50.208255 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 21:28:50.229289 kernel: ACPI: bus type USB registered Apr 12 21:28:50.229338 kernel: libata version 3.00 loaded. Apr 12 21:28:50.229347 kernel: usbcore: registered new interface driver usbfs Apr 12 21:28:50.247240 kernel: usbcore: registered new interface driver hub Apr 12 21:28:50.282174 kernel: usbcore: registered new device driver usb Apr 12 21:28:50.282203 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 21:28:50.315780 kernel: AES CTR mode by8 optimization enabled Apr 12 21:28:50.316240 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 21:28:50.350194 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 21:28:50.387104 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 21:28:50.387192 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Apr 12 21:28:50.387256 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 21:28:50.387308 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 21:28:50.391282 kernel: pps pps0: new PPS source ptp0 Apr 12 21:28:50.391354 kernel: igb 0000:03:00.0: added PHC on eth0 Apr 12 21:28:50.391414 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:28:50.391466 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:7a Apr 12 21:28:50.391519 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Apr 12 21:28:50.391570 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 21:28:50.425240 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 21:28:50.454600 kernel: pps pps1: new PPS source ptp1 Apr 12 21:28:50.454676 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 21:28:50.454733 kernel: igb 0000:04:00.0: added PHC on eth1 Apr 12 21:28:50.472284 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 21:28:50.503337 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:28:50.503412 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 21:28:50.520211 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6b:0a:7b Apr 12 21:28:50.539269 kernel: hub 1-0:1.0: USB hub found Apr 12 21:28:50.565348 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Apr 12 21:28:50.565420 kernel: hub 1-0:1.0: 16 ports detected Apr 12 21:28:50.578180 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 21:28:50.594296 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 21:28:50.595240 kernel: hub 2-0:1.0: USB hub found Apr 12 21:28:50.595324 kernel: hub 2-0:1.0: 10 ports detected Apr 12 21:28:50.662292 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Apr 12 21:28:50.662363 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Apr 12 21:28:50.701359 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 21:28:50.701431 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 21:28:50.808300 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Apr 12 21:28:50.808381 kernel: scsi host0: ahci Apr 12 21:28:50.832091 kernel: scsi host1: ahci Apr 12 21:28:50.832168 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:28:50.832229 kernel: scsi host2: ahci Apr 12 21:28:50.844309 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 21:28:50.879245 kernel: scsi host3: ahci Apr 12 21:28:50.904697 kernel: scsi host4: ahci Apr 12 21:28:50.917260 kernel: scsi host5: ahci Apr 12 21:28:50.946543 kernel: scsi host6: ahci Apr 12 21:28:50.946616 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 138 Apr 12 21:28:50.946625 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 138 Apr 12 21:28:50.963403 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 138 Apr 12 21:28:50.980105 kernel: hub 1-14:1.0: USB hub found Apr 12 21:28:50.980185 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 138 Apr 12 21:28:51.024013 kernel: hub 1-14:1.0: 4 ports detected Apr 12 21:28:51.024089 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 138 Apr 12 21:28:51.024098 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 138 Apr 12 21:28:51.077688 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 21:28:51.077759 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 138 Apr 12 21:28:51.095266 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Apr 12 21:28:51.111283 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 21:28:51.325291 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 21:28:51.421240 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 21:28:51.421260 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 21:28:51.421330 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 21:28:51.458266 kernel: port_module: 9 callbacks suppressed Apr 12 21:28:51.458283 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Apr 12 21:28:51.458353 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 21:28:51.491269 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:28:51.491346 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 21:28:51.507239 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 21:28:51.525239 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 21:28:51.573291 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 21:28:51.590239 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 21:28:51.606285 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 21:28:51.624297 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 21:28:51.675091 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 21:28:51.675112 kernel: ata2.00: Features: NCQ-prio Apr 12 21:28:51.675120 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 21:28:51.693240 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 21:28:51.693315 kernel: ata1.00: Features: NCQ-prio Apr 12 21:28:51.713291 kernel: ata2.00: configured for UDMA/133 Apr 12 21:28:51.742240 kernel: ata1.00: configured for UDMA/133 Apr 12 21:28:51.757296 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 21:28:51.776298 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 21:28:51.814241 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Apr 12 21:28:51.845381 kernel: usbcore: registered new interface driver usbhid Apr 12 21:28:51.845412 kernel: usbhid: USB HID core driver Apr 12 21:28:51.881240 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 21:28:51.881255 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:28:51.896158 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:51.912286 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 21:28:51.912402 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 21:28:51.912501 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Apr 12 21:28:51.933300 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 21:28:51.933378 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 21:28:51.933438 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 21:28:51.933504 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 21:28:51.933512 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 21:28:51.948248 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 21:28:51.965112 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 21:28:51.981242 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 21:28:51.996858 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 21:28:52.031299 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 21:28:52.175400 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:28:52.175427 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 21:28:52.213736 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:28:52.213751 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 21:28:52.231326 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:52.284773 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 21:28:52.284790 kernel: GPT:9289727 != 937703087 Apr 12 21:28:52.284798 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 21:28:52.302641 kernel: GPT:9289727 != 937703087 Apr 12 21:28:52.317874 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 21:28:52.334605 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:28:52.367337 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:52.367352 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 21:28:52.418659 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 21:28:52.453504 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (536) Apr 12 21:28:52.438253 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 21:28:52.463414 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 21:28:52.487694 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 21:28:52.524120 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:28:52.533890 systemd[1]: Starting disk-uuid.service... Apr 12 21:28:52.571332 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:52.571346 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:28:52.571404 disk-uuid[687]: Primary Header is updated. Apr 12 21:28:52.571404 disk-uuid[687]: Secondary Entries is updated. Apr 12 21:28:52.571404 disk-uuid[687]: Secondary Header is updated. Apr 12 21:28:52.628346 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:52.628356 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:28:52.628363 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:52.655280 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:28:53.634614 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:28:53.653174 disk-uuid[688]: The operation has completed successfully. Apr 12 21:28:53.661452 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:28:53.692094 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 21:28:53.790353 kernel: audit: type=1130 audit(1712957333.699:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:53.790367 kernel: audit: type=1131 audit(1712957333.699:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:53.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:53.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:53.692152 systemd[1]: Finished disk-uuid.service. Apr 12 21:28:53.819315 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 21:28:53.699963 systemd[1]: Starting verity-setup.service... Apr 12 21:28:53.847421 systemd[1]: Found device dev-mapper-usr.device. Apr 12 21:28:53.856316 systemd[1]: Mounting sysusr-usr.mount... Apr 12 21:28:53.869429 systemd[1]: Finished verity-setup.service. Apr 12 21:28:53.944351 kernel: audit: type=1130 audit(1712957333.875:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:53.944368 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 21:28:53.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:53.952421 systemd[1]: Mounted sysusr-usr.mount. Apr 12 21:28:53.959522 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 21:28:53.959925 systemd[1]: Starting ignition-setup.service... Apr 12 21:28:54.046297 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:28:54.046313 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:28:54.046321 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:28:54.046328 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:28:53.997098 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 21:28:54.054782 systemd[1]: Finished ignition-setup.service. Apr 12 21:28:54.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.072608 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 21:28:54.175664 kernel: audit: type=1130 audit(1712957334.072:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.175677 kernel: audit: type=1130 audit(1712957334.127:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.148351 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 21:28:54.206997 kernel: audit: type=1334 audit(1712957334.183:24): prog-id=9 op=LOAD Apr 12 21:28:54.183000 audit: BPF prog-id=9 op=LOAD Apr 12 21:28:54.185840 systemd[1]: Starting systemd-networkd.service... Apr 12 21:28:54.223812 systemd-networkd[868]: lo: Link UP Apr 12 21:28:54.223816 systemd-networkd[868]: lo: Gained carrier Apr 12 21:28:54.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.224112 systemd-networkd[868]: Enumeration completed Apr 12 21:28:54.304335 kernel: audit: type=1130 audit(1712957334.237:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.224193 systemd[1]: Started systemd-networkd.service. Apr 12 21:28:54.224836 systemd-networkd[868]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:28:54.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.238604 systemd[1]: Reached target network.target. Apr 12 21:28:54.386345 kernel: audit: type=1130 audit(1712957334.324:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.386358 iscsid[878]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:28:54.386358 iscsid[878]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 21:28:54.386358 iscsid[878]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 21:28:54.386358 iscsid[878]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 21:28:54.386358 iscsid[878]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 21:28:54.386358 iscsid[878]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:28:54.386358 iscsid[878]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 21:28:54.603450 kernel: audit: type=1130 audit(1712957334.393:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.603469 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 21:28:54.603558 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Apr 12 21:28:54.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.298484 systemd[1]: Starting iscsiuio.service... Apr 12 21:28:54.485192 ignition[865]: Ignition 2.14.0 Apr 12 21:28:54.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.311507 systemd[1]: Started iscsiuio.service. Apr 12 21:28:54.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:28:54.485197 ignition[865]: Stage: fetch-offline Apr 12 21:28:54.682433 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 21:28:54.325820 systemd[1]: Starting iscsid.service... Apr 12 21:28:54.485224 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:28:54.379495 systemd[1]: Started iscsid.service. Apr 12 21:28:54.485241 ignition[865]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:28:54.393860 systemd[1]: Starting dracut-initqueue.service... Apr 12 21:28:54.492574 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:28:54.463096 systemd-networkd[868]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:28:54.492637 ignition[865]: parsed url from cmdline: "" Apr 12 21:28:54.475424 systemd[1]: Finished dracut-initqueue.service. Apr 12 21:28:54.492639 ignition[865]: no config URL provided Apr 12 21:28:54.510086 unknown[865]: fetched base config from "system" Apr 12 21:28:54.492642 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 21:28:54.510090 unknown[865]: fetched user config from "system" Apr 12 21:28:54.492673 ignition[865]: parsing config with SHA512: 827aefe972ed78de9a62e6522df38c65a8add15cbb1849f24e652844332b8d37d2415fa0a5f2c06e90e0cf6e2ec815f47e9842a7d6025557194ae68e8c9e176b Apr 12 21:28:54.510411 systemd[1]: Reached target remote-fs-pre.target. Apr 12 21:28:54.510457 ignition[865]: fetch-offline: fetch-offline passed Apr 12 21:28:54.552437 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:28:54.510459 ignition[865]: POST message to Packet Timeline Apr 12 21:28:54.570452 systemd[1]: Reached target remote-fs.target. Apr 12 21:28:54.510464 ignition[865]: POST Status error: resource requires networking Apr 12 21:28:54.592362 systemd[1]: Starting dracut-pre-mount.service... Apr 12 21:28:54.510493 ignition[865]: Ignition finished successfully Apr 12 21:28:54.610609 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 21:28:54.650651 ignition[903]: Ignition 2.14.0 Apr 12 21:28:54.626646 systemd[1]: Finished dracut-pre-mount.service. Apr 12 21:28:54.650655 ignition[903]: Stage: kargs Apr 12 21:28:54.641532 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 21:28:54.650713 ignition[903]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:28:54.642489 systemd[1]: Starting ignition-kargs.service... Apr 12 21:28:54.650723 ignition[903]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:28:54.680306 systemd-networkd[868]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:28:54.652757 ignition[903]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:28:54.708366 systemd-networkd[868]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:28:54.653443 ignition[903]: kargs: kargs passed Apr 12 21:28:54.736788 systemd-networkd[868]: enp1s0f1np1: Link UP Apr 12 21:28:54.653446 ignition[903]: POST message to Packet Timeline Apr 12 21:28:54.736923 systemd-networkd[868]: enp1s0f1np1: Gained carrier Apr 12 21:28:54.653457 ignition[903]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:28:54.747480 systemd-networkd[868]: enp1s0f0np0: Link UP Apr 12 21:28:54.655358 ignition[903]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58757->[::1]:53: read: connection refused Apr 12 21:28:54.747616 systemd-networkd[868]: eno2: Link UP Apr 12 21:28:54.855978 ignition[903]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 21:28:54.747751 systemd-networkd[868]: eno1: Link UP Apr 12 21:28:54.857159 ignition[903]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43774->[::1]:53: read: connection refused Apr 12 21:28:55.257320 ignition[903]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 21:28:55.258500 ignition[903]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:32938->[::1]:53: read: connection refused Apr 12 21:28:55.500957 systemd-networkd[868]: enp1s0f0np0: Gained carrier Apr 12 21:28:55.510474 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Apr 12 21:28:55.523461 systemd-networkd[868]: enp1s0f0np0: DHCPv4 address 139.178.89.153/31, gateway 139.178.89.152 acquired from 145.40.83.140 Apr 12 21:28:55.799767 systemd-networkd[868]: enp1s0f1np1: Gained IPv6LL Apr 12 21:28:56.058813 ignition[903]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 21:28:56.060010 ignition[903]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58483->[::1]:53: read: connection refused Apr 12 21:28:57.143808 systemd-networkd[868]: enp1s0f0np0: Gained IPv6LL Apr 12 21:28:57.661392 ignition[903]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 21:28:57.662595 ignition[903]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48942->[::1]:53: read: connection refused Apr 12 21:29:00.865056 ignition[903]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 21:29:00.905520 ignition[903]: GET result: OK Apr 12 21:29:01.113413 ignition[903]: Ignition finished successfully Apr 12 21:29:01.117966 systemd[1]: Finished ignition-kargs.service. Apr 12 21:29:01.199786 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 21:29:01.199803 kernel: audit: type=1130 audit(1712957341.129:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.138529 ignition[918]: Ignition 2.14.0 Apr 12 21:29:01.131520 systemd[1]: Starting ignition-disks.service... Apr 12 21:29:01.138533 ignition[918]: Stage: disks Apr 12 21:29:01.138607 ignition[918]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:29:01.138616 ignition[918]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:29:01.140034 ignition[918]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:29:01.141798 ignition[918]: disks: disks passed Apr 12 21:29:01.141801 ignition[918]: POST message to Packet Timeline Apr 12 21:29:01.141812 ignition[918]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:29:01.173010 ignition[918]: GET result: OK Apr 12 21:29:01.365324 ignition[918]: Ignition finished successfully Apr 12 21:29:01.367949 systemd[1]: Finished ignition-disks.service. Apr 12 21:29:01.441334 kernel: audit: type=1130 audit(1712957341.380:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.380815 systemd[1]: Reached target initrd-root-device.target. Apr 12 21:29:01.449432 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:29:01.449472 systemd[1]: Reached target local-fs.target. Apr 12 21:29:01.471435 systemd[1]: Reached target sysinit.target. Apr 12 21:29:01.485442 systemd[1]: Reached target basic.target. Apr 12 21:29:01.500371 systemd[1]: Starting systemd-fsck-root.service... Apr 12 21:29:01.524333 systemd-fsck[933]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 21:29:01.534624 systemd[1]: Finished systemd-fsck-root.service. Apr 12 21:29:01.596291 kernel: audit: type=1130 audit(1712957341.544:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.546160 systemd[1]: Mounting sysroot.mount... Apr 12 21:29:01.632050 systemd[1]: Mounted sysroot.mount. Apr 12 21:29:01.646452 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 21:29:01.639476 systemd[1]: Reached target initrd-root-fs.target. Apr 12 21:29:01.647087 systemd[1]: Mounting sysroot-usr.mount... Apr 12 21:29:01.669221 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 21:29:01.686612 systemd[1]: Starting flatcar-static-network.service... Apr 12 21:29:01.700501 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 21:29:01.700591 systemd[1]: Reached target ignition-diskful.target. Apr 12 21:29:01.719448 systemd[1]: Mounted sysroot-usr.mount. Apr 12 21:29:01.744396 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:29:01.886058 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (947) Apr 12 21:29:01.886079 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:29:01.886087 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:29:01.886094 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:29:01.886102 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:29:01.886169 coreos-metadata[941]: Apr 12 21:29:01.828 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:29:01.886169 coreos-metadata[941]: Apr 12 21:29:01.851 INFO Fetch successful Apr 12 21:29:02.011222 kernel: audit: type=1130 audit(1712957341.894:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.011238 kernel: audit: type=1130 audit(1712957341.956:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.756371 systemd[1]: Starting initrd-setup-root.service... Apr 12 21:29:02.131765 kernel: audit: type=1130 audit(1712957342.019:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.131777 kernel: audit: type=1131 audit(1712957342.019:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.131821 coreos-metadata[940]: Apr 12 21:29:01.828 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:29:02.131821 coreos-metadata[940]: Apr 12 21:29:01.851 INFO Fetch successful Apr 12 21:29:02.131821 coreos-metadata[940]: Apr 12 21:29:01.869 INFO wrote hostname ci-3510.3.3-a-97ccf21113 to /sysroot/etc/hostname Apr 12 21:29:01.820353 systemd[1]: Finished initrd-setup-root.service. Apr 12 21:29:02.194695 initrd-setup-root[954]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 21:29:01.895592 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 21:29:02.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.243459 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Apr 12 21:29:02.282477 kernel: audit: type=1130 audit(1712957342.214:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:01.956565 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 21:29:02.293509 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 21:29:01.956606 systemd[1]: Finished flatcar-static-network.service. Apr 12 21:29:02.312507 ignition[1018]: INFO : Ignition 2.14.0 Apr 12 21:29:02.312507 ignition[1018]: INFO : Stage: mount Apr 12 21:29:02.312507 ignition[1018]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:29:02.312507 ignition[1018]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:29:02.312507 ignition[1018]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:29:02.312507 ignition[1018]: INFO : mount: mount passed Apr 12 21:29:02.312507 ignition[1018]: INFO : POST message to Packet Timeline Apr 12 21:29:02.312507 ignition[1018]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:29:02.312507 ignition[1018]: INFO : GET result: OK Apr 12 21:29:02.402520 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 21:29:02.019509 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:29:02.140836 systemd[1]: Starting ignition-mount.service... Apr 12 21:29:02.167785 systemd[1]: Starting sysroot-boot.service... Apr 12 21:29:02.189653 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 21:29:02.189880 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 21:29:02.204459 systemd[1]: Finished sysroot-boot.service. Apr 12 21:29:02.468597 ignition[1018]: INFO : Ignition finished successfully Apr 12 21:29:02.471047 systemd[1]: Finished ignition-mount.service. Apr 12 21:29:02.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.488467 systemd[1]: Starting ignition-files.service... Apr 12 21:29:02.559453 kernel: audit: type=1130 audit(1712957342.486:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:02.554209 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:29:02.615951 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1034) Apr 12 21:29:02.615967 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:29:02.615975 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:29:02.639078 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:29:02.688277 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:29:02.689589 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:29:02.706380 ignition[1053]: INFO : Ignition 2.14.0 Apr 12 21:29:02.706380 ignition[1053]: INFO : Stage: files Apr 12 21:29:02.706380 ignition[1053]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:29:02.706380 ignition[1053]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:29:02.706380 ignition[1053]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:29:02.706380 ignition[1053]: DEBUG : files: compiled without relabeling support, skipping Apr 12 21:29:02.706380 ignition[1053]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 21:29:02.706380 ignition[1053]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 21:29:02.709092 unknown[1053]: wrote ssh authorized keys file for user: core Apr 12 21:29:02.807346 ignition[1053]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 21:29:02.807346 ignition[1053]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 21:29:02.807346 ignition[1053]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 21:29:02.807346 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 21:29:02.807346 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 21:29:02.807346 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 21:29:02.889546 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 21:29:02.889546 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 21:29:02.889546 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 21:29:03.373114 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 21:29:03.468412 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 21:29:03.494487 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 21:29:03.494487 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 21:29:03.494487 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 21:29:03.882612 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 21:29:03.936875 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 21:29:03.962499 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 21:29:03.962499 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 21:29:03.962499 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 21:29:04.174631 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 21:29:10.176294 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Apr 12 21:29:10.176294 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 21:29:10.228513 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 21:29:10.228513 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 21:29:10.337010 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 21:29:24.190989 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Apr 12 21:29:24.216642 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 21:29:24.216642 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 21:29:24.216642 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 21:29:24.274462 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 21:29:24.733740 ignition[1053]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Apr 12 21:29:24.733740 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 21:29:24.792386 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1056) Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 21:29:24.792401 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem682643466" Apr 12 21:29:24.792401 ignition[1053]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem682643466": device or resource busy Apr 12 21:29:25.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.101561 ignition[1053]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem682643466", trying btrfs: device or resource busy Apr 12 21:29:25.101561 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem682643466" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem682643466" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem682643466" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem682643466" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 21:29:25.101561 ignition[1053]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 21:29:25.757513 kernel: audit: type=1130 audit(1712957365.043:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.757588 kernel: audit: type=1130 audit(1712957365.184:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.757622 kernel: audit: type=1130 audit(1712957365.255:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.757654 kernel: audit: type=1131 audit(1712957365.255:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.757682 kernel: audit: type=1130 audit(1712957365.431:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.757709 kernel: audit: type=1131 audit(1712957365.431:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.757736 kernel: audit: type=1130 audit(1712957365.608:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:24.793466 systemd[1]: mnt-oem682643466.mount: Deactivated successfully. Apr 12 21:29:25.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-helm.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1f): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: op(1f): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 21:29:25.835879 ignition[1053]: INFO : files: files passed Apr 12 21:29:25.835879 ignition[1053]: INFO : POST message to Packet Timeline Apr 12 21:29:25.835879 ignition[1053]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:29:25.835879 ignition[1053]: INFO : GET result: OK Apr 12 21:29:25.835879 ignition[1053]: INFO : Ignition finished successfully Apr 12 21:29:26.391367 kernel: audit: type=1131 audit(1712957365.766:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.391386 kernel: audit: type=1131 audit(1712957366.084:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.391398 kernel: audit: type=1131 audit(1712957366.176:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.021026 systemd[1]: Finished ignition-files.service. Apr 12 21:29:26.405348 initrd-setup-root-after-ignition[1086]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 21:29:26.426547 iscsid[878]: iscsid shutting down. Apr 12 21:29:25.049065 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 21:29:26.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.110527 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 21:29:26.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.110841 systemd[1]: Starting ignition-quench.service... Apr 12 21:29:26.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.157644 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 21:29:26.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.184780 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 21:29:25.184893 systemd[1]: Finished ignition-quench.service. Apr 12 21:29:25.255492 systemd[1]: Reached target ignition-complete.target. Apr 12 21:29:26.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.556778 ignition[1101]: INFO : Ignition 2.14.0 Apr 12 21:29:26.556778 ignition[1101]: INFO : Stage: umount Apr 12 21:29:26.556778 ignition[1101]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:29:26.556778 ignition[1101]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:29:26.556778 ignition[1101]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:29:26.556778 ignition[1101]: INFO : umount: umount passed Apr 12 21:29:26.556778 ignition[1101]: INFO : POST message to Packet Timeline Apr 12 21:29:26.556778 ignition[1101]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:29:26.556778 ignition[1101]: INFO : GET result: OK Apr 12 21:29:26.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.376847 systemd[1]: Starting initrd-parse-etc.service... Apr 12 21:29:26.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.707512 ignition[1101]: INFO : Ignition finished successfully Apr 12 21:29:26.723000 audit: BPF prog-id=6 op=UNLOAD Apr 12 21:29:25.406166 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 21:29:26.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.406216 systemd[1]: Finished initrd-parse-etc.service. Apr 12 21:29:26.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.431468 systemd[1]: Reached target initrd-fs.target. Apr 12 21:29:26.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.553465 systemd[1]: Reached target initrd.target. Apr 12 21:29:26.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.553523 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 21:29:25.553885 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 21:29:26.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.589642 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 21:29:26.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.609202 systemd[1]: Starting initrd-cleanup.service... Apr 12 21:29:26.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.678395 systemd[1]: Stopped target nss-lookup.target. Apr 12 21:29:25.689564 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 21:29:26.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.708624 systemd[1]: Stopped target timers.target. Apr 12 21:29:25.740670 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 21:29:25.740808 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 21:29:25.767275 systemd[1]: Stopped target initrd.target. Apr 12 21:29:26.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.842548 systemd[1]: Stopped target basic.target. Apr 12 21:29:26.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.853610 systemd[1]: Stopped target ignition-complete.target. Apr 12 21:29:26.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.871582 systemd[1]: Stopped target ignition-diskful.target. Apr 12 21:29:25.904621 systemd[1]: Stopped target initrd-root-device.target. Apr 12 21:29:26.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.930843 systemd[1]: Stopped target remote-fs.target. Apr 12 21:29:27.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.951810 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 21:29:27.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.976961 systemd[1]: Stopped target sysinit.target. Apr 12 21:29:27.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:27.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:25.999836 systemd[1]: Stopped target local-fs.target. Apr 12 21:29:26.020846 systemd[1]: Stopped target local-fs-pre.target. Apr 12 21:29:26.042838 systemd[1]: Stopped target swap.target. Apr 12 21:29:26.062728 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 21:29:26.063096 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 21:29:26.085158 systemd[1]: Stopped target cryptsetup.target. Apr 12 21:29:26.162526 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 21:29:26.162611 systemd[1]: Stopped dracut-initqueue.service. Apr 12 21:29:26.176657 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 21:29:26.176733 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 21:29:26.246644 systemd[1]: Stopped target paths.target. Apr 12 21:29:26.266524 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 21:29:26.270458 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 21:29:27.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:26.282618 systemd[1]: Stopped target slices.target. Apr 12 21:29:26.313575 systemd[1]: Stopped target sockets.target. Apr 12 21:29:26.329823 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 21:29:26.330145 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 21:29:26.347930 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 21:29:26.348292 systemd[1]: Stopped ignition-files.service. Apr 12 21:29:26.366931 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 21:29:26.367313 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 21:29:26.384935 systemd[1]: Stopping ignition-mount.service... Apr 12 21:29:26.398581 systemd[1]: Stopping iscsid.service... Apr 12 21:29:26.412898 systemd[1]: Stopping sysroot-boot.service... Apr 12 21:29:26.433424 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 21:29:26.433583 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 21:29:26.448816 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 21:29:26.449002 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 21:29:26.471862 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 21:29:26.472200 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 21:29:26.472253 systemd[1]: Stopped iscsid.service. Apr 12 21:29:26.490767 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 21:29:26.490825 systemd[1]: Stopped sysroot-boot.service. Apr 12 21:29:26.504912 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 21:29:26.504996 systemd[1]: Closed iscsid.socket. Apr 12 21:29:26.519591 systemd[1]: Stopping iscsiuio.service... Apr 12 21:29:26.535099 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 21:29:26.535331 systemd[1]: Stopped iscsiuio.service. Apr 12 21:29:26.549180 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 21:29:26.549422 systemd[1]: Finished initrd-cleanup.service. Apr 12 21:29:26.566664 systemd[1]: Stopped target network.target. Apr 12 21:29:26.579521 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 21:29:26.579627 systemd[1]: Closed iscsiuio.socket. Apr 12 21:29:26.593859 systemd[1]: Stopping systemd-networkd.service... Apr 12 21:29:26.601437 systemd-networkd[868]: enp1s0f1np1: DHCPv6 lease lost Apr 12 21:29:26.604835 systemd[1]: Stopping systemd-resolved.service... Apr 12 21:29:26.611473 systemd-networkd[868]: enp1s0f0np0: DHCPv6 lease lost Apr 12 21:29:26.638037 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 21:29:27.259000 audit: BPF prog-id=9 op=UNLOAD Apr 12 21:29:26.638302 systemd[1]: Stopped systemd-resolved.service. Apr 12 21:29:26.649879 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 21:29:26.650216 systemd[1]: Stopped systemd-networkd.service. Apr 12 21:29:26.677415 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 21:29:26.677477 systemd[1]: Stopped ignition-mount.service. Apr 12 21:29:26.699587 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 21:29:27.261241 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Apr 12 21:29:26.699613 systemd[1]: Closed systemd-networkd.socket. Apr 12 21:29:26.715452 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 21:29:26.715547 systemd[1]: Stopped ignition-disks.service. Apr 12 21:29:26.731563 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 21:29:26.731669 systemd[1]: Stopped ignition-kargs.service. Apr 12 21:29:26.747605 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 21:29:26.747746 systemd[1]: Stopped ignition-setup.service. Apr 12 21:29:26.762595 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 21:29:26.762726 systemd[1]: Stopped initrd-setup-root.service. Apr 12 21:29:26.779391 systemd[1]: Stopping network-cleanup.service... Apr 12 21:29:26.791435 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 21:29:26.791620 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 21:29:26.810652 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 21:29:26.810787 systemd[1]: Stopped systemd-sysctl.service. Apr 12 21:29:26.826899 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 21:29:26.827042 systemd[1]: Stopped systemd-modules-load.service. Apr 12 21:29:26.843918 systemd[1]: Stopping systemd-udevd.service... Apr 12 21:29:26.861315 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 21:29:26.862784 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 21:29:26.863109 systemd[1]: Stopped systemd-udevd.service. Apr 12 21:29:26.875136 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 21:29:26.875285 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 21:29:26.888574 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 21:29:26.888675 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 21:29:26.903617 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 21:29:26.903750 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 21:29:26.926448 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 21:29:26.926555 systemd[1]: Stopped dracut-cmdline.service. Apr 12 21:29:26.941567 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 21:29:26.941621 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 21:29:26.957362 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 21:29:26.973310 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 21:29:26.973342 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 21:29:26.989533 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 21:29:26.989567 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 21:29:27.006499 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 21:29:27.006546 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 21:29:27.024301 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 21:29:27.025511 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 21:29:27.025711 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 21:29:27.134057 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 21:29:27.134393 systemd[1]: Stopped network-cleanup.service. Apr 12 21:29:27.149819 systemd[1]: Reached target initrd-switch-root.target. Apr 12 21:29:27.167308 systemd[1]: Starting initrd-switch-root.service... Apr 12 21:29:27.205545 systemd[1]: Switching root. Apr 12 21:29:27.262550 systemd-journald[267]: Journal stopped Apr 12 21:29:31.198539 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 21:29:31.198553 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 21:29:31.198561 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 21:29:31.198567 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 21:29:31.198572 kernel: SELinux: policy capability open_perms=1 Apr 12 21:29:31.198577 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 21:29:31.198583 kernel: SELinux: policy capability always_check_network=0 Apr 12 21:29:31.198588 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 21:29:31.198593 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 21:29:31.198600 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 21:29:31.198605 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 21:29:31.198611 systemd[1]: Successfully loaded SELinux policy in 319.628ms. Apr 12 21:29:31.198618 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.780ms. Apr 12 21:29:31.198625 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:29:31.198632 systemd[1]: Detected architecture x86-64. Apr 12 21:29:31.198639 systemd[1]: Detected first boot. Apr 12 21:29:31.198644 systemd[1]: Hostname set to . Apr 12 21:29:31.198651 systemd[1]: Initializing machine ID from random generator. Apr 12 21:29:31.198656 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 21:29:31.198681 systemd[1]: Populated /etc with preset unit settings. Apr 12 21:29:31.198702 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:29:31.198709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:29:31.198716 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:29:31.198722 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 21:29:31.198728 systemd[1]: Stopped initrd-switch-root.service. Apr 12 21:29:31.198734 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 21:29:31.198740 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 21:29:31.198747 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 21:29:31.198754 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 21:29:31.198760 systemd[1]: Created slice system-getty.slice. Apr 12 21:29:31.198766 systemd[1]: Created slice system-modprobe.slice. Apr 12 21:29:31.198772 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 21:29:31.198778 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 21:29:31.198784 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 21:29:31.198790 systemd[1]: Created slice user.slice. Apr 12 21:29:31.198796 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:29:31.198803 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 21:29:31.198809 systemd[1]: Set up automount boot.automount. Apr 12 21:29:31.198815 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 21:29:31.198822 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 21:29:31.198829 systemd[1]: Stopped target initrd-fs.target. Apr 12 21:29:31.198836 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 21:29:31.198842 systemd[1]: Reached target integritysetup.target. Apr 12 21:29:31.198848 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:29:31.198855 systemd[1]: Reached target remote-fs.target. Apr 12 21:29:31.198880 systemd[1]: Reached target slices.target. Apr 12 21:29:31.198901 systemd[1]: Reached target swap.target. Apr 12 21:29:31.198907 systemd[1]: Reached target torcx.target. Apr 12 21:29:31.198913 systemd[1]: Reached target veritysetup.target. Apr 12 21:29:31.198919 systemd[1]: Listening on systemd-coredump.socket. Apr 12 21:29:31.198926 systemd[1]: Listening on systemd-initctl.socket. Apr 12 21:29:31.198932 systemd[1]: Listening on systemd-networkd.socket. Apr 12 21:29:31.198956 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:29:31.198963 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:29:31.198970 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 21:29:31.198976 systemd[1]: Mounting dev-hugepages.mount... Apr 12 21:29:31.198983 systemd[1]: Mounting dev-mqueue.mount... Apr 12 21:29:31.198989 systemd[1]: Mounting media.mount... Apr 12 21:29:31.199011 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 21:29:31.199017 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 21:29:31.199024 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 21:29:31.199030 systemd[1]: Mounting tmp.mount... Apr 12 21:29:31.199036 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 21:29:31.199043 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 21:29:31.199049 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:29:31.199055 systemd[1]: Starting modprobe@configfs.service... Apr 12 21:29:31.199062 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 21:29:31.199069 systemd[1]: Starting modprobe@drm.service... Apr 12 21:29:31.199075 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 21:29:31.199082 systemd[1]: Starting modprobe@fuse.service... Apr 12 21:29:31.199088 kernel: fuse: init (API version 7.34) Apr 12 21:29:31.199094 systemd[1]: Starting modprobe@loop.service... Apr 12 21:29:31.199101 kernel: loop: module loaded Apr 12 21:29:31.199107 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 21:29:31.199114 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 21:29:31.199121 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 21:29:31.199127 kernel: kauditd_printk_skb: 60 callbacks suppressed Apr 12 21:29:31.199133 kernel: audit: type=1131 audit(1712957370.840:103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.199139 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 21:29:31.199146 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 21:29:31.199152 kernel: audit: type=1131 audit(1712957370.928:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.199158 systemd[1]: Stopped systemd-journald.service. Apr 12 21:29:31.199164 kernel: audit: type=1130 audit(1712957370.992:105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.199171 kernel: audit: type=1131 audit(1712957370.992:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.199177 kernel: audit: type=1334 audit(1712957371.077:107): prog-id=15 op=LOAD Apr 12 21:29:31.199183 kernel: audit: type=1334 audit(1712957371.095:108): prog-id=16 op=LOAD Apr 12 21:29:31.199189 kernel: audit: type=1334 audit(1712957371.113:109): prog-id=17 op=LOAD Apr 12 21:29:31.199194 kernel: audit: type=1334 audit(1712957371.131:110): prog-id=13 op=UNLOAD Apr 12 21:29:31.199200 systemd[1]: Starting systemd-journald.service... Apr 12 21:29:31.199206 kernel: audit: type=1334 audit(1712957371.131:111): prog-id=14 op=UNLOAD Apr 12 21:29:31.199212 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:29:31.199220 kernel: audit: type=1305 audit(1712957371.195:112): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 21:29:31.199228 systemd-journald[1254]: Journal started Apr 12 21:29:31.199277 systemd-journald[1254]: Runtime Journal (/run/log/journal/9d022b487be5465395f00ecd5bcad4f3) is 8.0M, max 640.1M, 632.1M free. Apr 12 21:29:27.658000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 21:29:27.954000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:29:27.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:29:27.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:29:27.957000 audit: BPF prog-id=10 op=LOAD Apr 12 21:29:27.957000 audit: BPF prog-id=10 op=UNLOAD Apr 12 21:29:27.957000 audit: BPF prog-id=11 op=LOAD Apr 12 21:29:27.957000 audit: BPF prog-id=11 op=UNLOAD Apr 12 21:29:28.027000 audit[1143]: AVC avc: denied { associate } for pid=1143 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 21:29:28.027000 audit[1143]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1126 pid=1143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:28.027000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:29:28.054000 audit[1143]: AVC avc: denied { associate } for pid=1143 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 21:29:28.054000 audit[1143]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1126 pid=1143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:28.054000 audit: CWD cwd="/" Apr 12 21:29:28.054000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:28.054000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:28.054000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:29:29.584000 audit: BPF prog-id=12 op=LOAD Apr 12 21:29:29.584000 audit: BPF prog-id=3 op=UNLOAD Apr 12 21:29:29.584000 audit: BPF prog-id=13 op=LOAD Apr 12 21:29:29.584000 audit: BPF prog-id=14 op=LOAD Apr 12 21:29:29.584000 audit: BPF prog-id=4 op=UNLOAD Apr 12 21:29:29.584000 audit: BPF prog-id=5 op=UNLOAD Apr 12 21:29:29.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:29.637000 audit: BPF prog-id=12 op=UNLOAD Apr 12 21:29:29.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:29.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:30.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:30.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:30.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:30.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.077000 audit: BPF prog-id=15 op=LOAD Apr 12 21:29:31.095000 audit: BPF prog-id=16 op=LOAD Apr 12 21:29:31.113000 audit: BPF prog-id=17 op=LOAD Apr 12 21:29:31.131000 audit: BPF prog-id=13 op=UNLOAD Apr 12 21:29:31.131000 audit: BPF prog-id=14 op=UNLOAD Apr 12 21:29:31.195000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 21:29:28.025903 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:29:29.583609 systemd[1]: Queued start job for default target multi-user.target. Apr 12 21:29:28.026420 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:29:29.586048 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 21:29:28.026441 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:29:28.026466 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 21:29:28.026474 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 21:29:28.026497 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 21:29:28.026506 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 21:29:28.026655 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 21:29:28.026687 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:29:28.026697 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:29:28.028165 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 21:29:28.028194 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 21:29:28.028209 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 21:29:28.028221 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 21:29:28.028239 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 21:29:28.028254 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 21:29:29.228431 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:29:29.228572 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:29:29.228632 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:29:29.228726 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:29:29.228757 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 21:29:29.228790 /usr/lib/systemd/system-generators/torcx-generator[1143]: time="2024-04-12T21:29:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 21:29:31.195000 audit[1254]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffcf033a580 a2=4000 a3=7ffcf033a61c items=0 ppid=1 pid=1254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:31.195000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 21:29:31.277439 systemd[1]: Starting systemd-network-generator.service... Apr 12 21:29:31.304241 systemd[1]: Starting systemd-remount-fs.service... Apr 12 21:29:31.334240 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:29:31.377901 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 21:29:31.377958 systemd[1]: Stopped verity-setup.service. Apr 12 21:29:31.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.423282 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 21:29:31.443430 systemd[1]: Started systemd-journald.service. Apr 12 21:29:31.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.451787 systemd[1]: Mounted dev-hugepages.mount. Apr 12 21:29:31.459506 systemd[1]: Mounted dev-mqueue.mount. Apr 12 21:29:31.466485 systemd[1]: Mounted media.mount. Apr 12 21:29:31.473504 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 21:29:31.482488 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 21:29:31.491497 systemd[1]: Mounted tmp.mount. Apr 12 21:29:31.498550 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 21:29:31.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.506613 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:29:31.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.514611 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 21:29:31.514747 systemd[1]: Finished modprobe@configfs.service. Apr 12 21:29:31.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.523719 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 21:29:31.523891 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 21:29:31.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.532865 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 21:29:31.533107 systemd[1]: Finished modprobe@drm.service. Apr 12 21:29:31.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.542102 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 21:29:31.542445 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 21:29:31.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.551269 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 21:29:31.551684 systemd[1]: Finished modprobe@fuse.service. Apr 12 21:29:31.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.561083 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 21:29:31.561431 systemd[1]: Finished modprobe@loop.service. Apr 12 21:29:31.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.570088 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:29:31.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.579174 systemd[1]: Finished systemd-network-generator.service. Apr 12 21:29:31.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.588045 systemd[1]: Finished systemd-remount-fs.service. Apr 12 21:29:31.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.597037 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:29:31.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.606523 systemd[1]: Reached target network-pre.target. Apr 12 21:29:31.617005 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 21:29:31.625945 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 21:29:31.633450 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 21:29:31.634388 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 21:29:31.641890 systemd[1]: Starting systemd-journal-flush.service... Apr 12 21:29:31.645569 systemd-journald[1254]: Time spent on flushing to /var/log/journal/9d022b487be5465395f00ecd5bcad4f3 is 15.219ms for 1618 entries. Apr 12 21:29:31.645569 systemd-journald[1254]: System Journal (/var/log/journal/9d022b487be5465395f00ecd5bcad4f3) is 8.0M, max 195.6M, 187.6M free. Apr 12 21:29:31.684316 systemd-journald[1254]: Received client request to flush runtime journal. Apr 12 21:29:31.658342 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 21:29:31.658912 systemd[1]: Starting systemd-random-seed.service... Apr 12 21:29:31.673360 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 21:29:31.673870 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:29:31.680833 systemd[1]: Starting systemd-sysusers.service... Apr 12 21:29:31.687893 systemd[1]: Starting systemd-udev-settle.service... Apr 12 21:29:31.695415 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 21:29:31.703410 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 21:29:31.711470 systemd[1]: Finished systemd-journal-flush.service. Apr 12 21:29:31.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.719472 systemd[1]: Finished systemd-random-seed.service. Apr 12 21:29:31.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.727438 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:29:31.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.735444 systemd[1]: Finished systemd-sysusers.service. Apr 12 21:29:31.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.744371 systemd[1]: Reached target first-boot-complete.target. Apr 12 21:29:31.753081 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 21:29:31.762395 udevadm[1270]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 21:29:31.771141 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 21:29:31.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.941465 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 21:29:31.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.950000 audit: BPF prog-id=18 op=LOAD Apr 12 21:29:31.950000 audit: BPF prog-id=19 op=LOAD Apr 12 21:29:31.950000 audit: BPF prog-id=7 op=UNLOAD Apr 12 21:29:31.950000 audit: BPF prog-id=8 op=UNLOAD Apr 12 21:29:31.951573 systemd[1]: Starting systemd-udevd.service... Apr 12 21:29:31.963117 systemd-udevd[1273]: Using default interface naming scheme 'v252'. Apr 12 21:29:31.982641 systemd[1]: Started systemd-udevd.service. Apr 12 21:29:31.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:31.993542 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 21:29:31.993000 audit: BPF prog-id=20 op=LOAD Apr 12 21:29:31.994912 systemd[1]: Starting systemd-networkd.service... Apr 12 21:29:32.016000 audit: BPF prog-id=21 op=LOAD Apr 12 21:29:32.016000 audit: BPF prog-id=22 op=LOAD Apr 12 21:29:32.016000 audit: BPF prog-id=23 op=LOAD Apr 12 21:29:32.018245 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 21:29:32.020063 systemd[1]: Starting systemd-userdbd.service... Apr 12 21:29:32.036298 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 21:29:32.036342 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 21:29:32.036355 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1283) Apr 12 21:29:32.037270 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 21:29:32.041240 kernel: ACPI: button: Power Button [PWRF] Apr 12 21:29:32.119387 kernel: IPMI message handler: version 39.2 Apr 12 21:29:32.048000 audit[1338]: AVC avc: denied { confidentiality } for pid=1338 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:29:32.048000 audit[1338]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555d81523f70 a1=4d8bc a2=7f45706c7bc5 a3=5 items=42 ppid=1273 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:32.048000 audit: CWD cwd="/" Apr 12 21:29:32.048000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=1 name=(null) inode=15596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=2 name=(null) inode=15596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=3 name=(null) inode=15597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=4 name=(null) inode=15596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=5 name=(null) inode=15598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=6 name=(null) inode=15596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=7 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=8 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=9 name=(null) inode=15600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=10 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=11 name=(null) inode=15601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=12 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=13 name=(null) inode=15602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=14 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=15 name=(null) inode=15603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=16 name=(null) inode=15599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=17 name=(null) inode=15604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=18 name=(null) inode=15596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=19 name=(null) inode=15605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=20 name=(null) inode=15605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=21 name=(null) inode=15606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=22 name=(null) inode=15605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=23 name=(null) inode=15607 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=24 name=(null) inode=15605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=25 name=(null) inode=15608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=26 name=(null) inode=15605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=27 name=(null) inode=15609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=28 name=(null) inode=15605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=29 name=(null) inode=15610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=30 name=(null) inode=15596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=31 name=(null) inode=15611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=32 name=(null) inode=15611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=33 name=(null) inode=15612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=34 name=(null) inode=15611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=35 name=(null) inode=15613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=36 name=(null) inode=15611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=37 name=(null) inode=15614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=38 name=(null) inode=15611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=39 name=(null) inode=15615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=40 name=(null) inode=15611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PATH item=41 name=(null) inode=15616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:29:32.048000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 21:29:32.158250 kernel: ipmi device interface Apr 12 21:29:32.180870 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:29:32.189431 systemd[1]: Started systemd-userdbd.service. Apr 12 21:29:32.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:32.200247 kernel: ipmi_si: IPMI System Interface driver Apr 12 21:29:32.200298 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 21:29:32.200525 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 21:29:32.238167 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 21:29:32.300048 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 21:29:32.300112 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 21:29:32.338983 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 21:29:32.339151 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 21:29:32.361277 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 21:29:32.398853 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 21:29:32.415968 systemd-networkd[1325]: bond0: netdev ready Apr 12 21:29:32.418272 systemd-networkd[1325]: lo: Link UP Apr 12 21:29:32.418275 systemd-networkd[1325]: lo: Gained carrier Apr 12 21:29:32.418785 systemd-networkd[1325]: Enumeration completed Apr 12 21:29:32.418847 systemd[1]: Started systemd-networkd.service. Apr 12 21:29:32.419112 systemd-networkd[1325]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 21:29:32.420268 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 21:29:32.420958 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 21:29:32.422218 systemd-networkd[1325]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:15:b1:1d.network. Apr 12 21:29:32.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:32.461124 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 21:29:32.483811 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 21:29:32.506300 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 21:29:32.506367 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 21:29:32.589887 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Apr 12 21:29:32.589982 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Apr 12 21:29:32.590054 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Apr 12 21:29:32.672623 kernel: intel_rapl_common: Found RAPL domain package Apr 12 21:29:32.672661 kernel: intel_rapl_common: Found RAPL domain core Apr 12 21:29:32.672686 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 21:29:32.689573 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 21:29:32.726303 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 21:29:32.815300 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 21:29:32.839333 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Apr 12 21:29:32.861279 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:29:32.880275 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 21:29:32.882103 systemd-networkd[1325]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:15:b1:1c.network. Apr 12 21:29:32.883592 systemd[1]: Finished systemd-udev-settle.service. Apr 12 21:29:32.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:32.893596 systemd[1]: Starting lvm2-activation-early.service... Apr 12 21:29:32.909328 lvm[1377]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 21:29:32.937699 systemd[1]: Finished lvm2-activation-early.service. Apr 12 21:29:32.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:32.946339 systemd[1]: Reached target cryptsetup.target. Apr 12 21:29:32.954980 systemd[1]: Starting lvm2-activation.service... Apr 12 21:29:32.957424 lvm[1378]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 21:29:32.989276 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:29:33.002667 systemd[1]: Finished lvm2-activation.service. Apr 12 21:29:33.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:33.010375 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:29:33.018340 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 21:29:33.018356 systemd[1]: Reached target local-fs.target. Apr 12 21:29:33.026319 systemd[1]: Reached target machines.target. Apr 12 21:29:33.034968 systemd[1]: Starting ldconfig.service... Apr 12 21:29:33.041717 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 21:29:33.041738 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:29:33.042364 systemd[1]: Starting systemd-boot-update.service... Apr 12 21:29:33.050742 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 21:29:33.061842 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 21:29:33.062065 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 21:29:33.062115 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 21:29:33.062652 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 21:29:33.062940 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1380 (bootctl) Apr 12 21:29:33.064926 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 21:29:33.074540 systemd-tmpfiles[1384]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 21:29:33.081599 systemd-tmpfiles[1384]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 21:29:33.086500 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 21:29:33.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:33.092984 systemd-tmpfiles[1384]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 21:29:33.243343 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 21:29:33.269282 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Apr 12 21:29:33.269994 systemd-networkd[1325]: bond0: Link UP Apr 12 21:29:33.270350 systemd-networkd[1325]: enp1s0f1np1: Link UP Apr 12 21:29:33.270592 systemd-networkd[1325]: enp1s0f1np1: Gained carrier Apr 12 21:29:33.272370 systemd-networkd[1325]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:15:b1:1c.network. Apr 12 21:29:33.308516 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 21:29:33.308586 kernel: bond0: active interface up! Apr 12 21:29:33.330280 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 21:29:33.417592 systemd-networkd[1325]: bond0: Gained carrier Apr 12 21:29:33.417733 systemd-networkd[1325]: enp1s0f0np0: Link UP Apr 12 21:29:33.417871 systemd-networkd[1325]: enp1s0f0np0: Gained carrier Apr 12 21:29:33.430430 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 21:29:33.430752 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 21:29:33.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:33.432633 systemd-networkd[1325]: enp1s0f1np1: Link DOWN Apr 12 21:29:33.432635 systemd-networkd[1325]: enp1s0f1np1: Lost carrier Apr 12 21:29:33.471060 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:29:33.471099 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Apr 12 21:29:33.471221 systemd-fsck[1388]: fsck.fat 4.2 (2021-01-31) Apr 12 21:29:33.471221 systemd-fsck[1388]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 21:29:33.471927 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 21:29:33.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:33.482014 systemd[1]: Mounting boot.mount... Apr 12 21:29:33.493184 systemd[1]: Mounted boot.mount. Apr 12 21:29:33.511793 systemd[1]: Finished systemd-boot-update.service. Apr 12 21:29:33.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:33.544657 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 21:29:33.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:33.553048 systemd[1]: Starting audit-rules.service... Apr 12 21:29:33.559814 systemd[1]: Starting clean-ca-certificates.service... Apr 12 21:29:33.569878 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 21:29:33.571000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 21:29:33.571000 audit[1408]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff1a0729a0 a2=420 a3=0 items=0 ppid=1391 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:33.571000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 21:29:33.573124 augenrules[1408]: No rules Apr 12 21:29:33.579227 systemd[1]: Starting systemd-resolved.service... Apr 12 21:29:33.588980 systemd[1]: Starting systemd-timesyncd.service... Apr 12 21:29:33.595837 systemd[1]: Starting systemd-update-utmp.service... Apr 12 21:29:33.602584 systemd[1]: Finished audit-rules.service. Apr 12 21:29:33.613649 systemd[1]: Finished clean-ca-certificates.service. Apr 12 21:29:33.625316 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 21:29:33.639450 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 21:29:33.646289 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Apr 12 21:29:33.647239 systemd-networkd[1325]: enp1s0f1np1: Link UP Apr 12 21:29:33.647392 systemd-networkd[1325]: enp1s0f1np1: Gained carrier Apr 12 21:29:33.656483 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 21:29:33.657034 systemd[1]: Finished systemd-update-utmp.service. Apr 12 21:29:33.663383 ldconfig[1379]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 21:29:33.665781 systemd[1]: Finished ldconfig.service. Apr 12 21:29:33.673973 systemd[1]: Starting systemd-update-done.service... Apr 12 21:29:33.684859 systemd-resolved[1413]: Positive Trust Anchors: Apr 12 21:29:33.684867 systemd-resolved[1413]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 21:29:33.684886 systemd-resolved[1413]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 21:29:33.686390 systemd[1]: Started systemd-timesyncd.service. Apr 12 21:29:33.688821 systemd-resolved[1413]: Using system hostname 'ci-3510.3.3-a-97ccf21113'. Apr 12 21:29:33.698294 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Apr 12 21:29:33.714404 systemd[1]: Started systemd-resolved.service. Apr 12 21:29:33.719299 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 21:29:33.727449 systemd[1]: Finished systemd-update-done.service. Apr 12 21:29:33.735376 systemd[1]: Reached target network.target. Apr 12 21:29:33.743315 systemd[1]: Reached target nss-lookup.target. Apr 12 21:29:33.751369 systemd[1]: Reached target sysinit.target. Apr 12 21:29:33.759367 systemd[1]: Started motdgen.path. Apr 12 21:29:33.766337 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 21:29:33.776320 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 21:29:33.784305 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 21:29:33.784321 systemd[1]: Reached target paths.target. Apr 12 21:29:33.791314 systemd[1]: Reached target time-set.target. Apr 12 21:29:33.799376 systemd[1]: Started logrotate.timer. Apr 12 21:29:33.806358 systemd[1]: Started mdadm.timer. Apr 12 21:29:33.813304 systemd[1]: Reached target timers.target. Apr 12 21:29:33.820438 systemd[1]: Listening on dbus.socket. Apr 12 21:29:33.827826 systemd[1]: Starting docker.socket... Apr 12 21:29:33.835792 systemd[1]: Listening on sshd.socket. Apr 12 21:29:33.842383 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:29:33.842607 systemd[1]: Listening on docker.socket. Apr 12 21:29:33.849366 systemd[1]: Reached target sockets.target. Apr 12 21:29:33.857315 systemd[1]: Reached target basic.target. Apr 12 21:29:33.864337 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 21:29:33.864354 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 21:29:33.864803 systemd[1]: Starting containerd.service... Apr 12 21:29:33.871750 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 21:29:33.880788 systemd[1]: Starting coreos-metadata.service... Apr 12 21:29:33.887822 systemd[1]: Starting dbus.service... Apr 12 21:29:33.893833 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 21:29:33.897930 jq[1429]: false Apr 12 21:29:33.900856 systemd[1]: Starting extend-filesystems.service... Apr 12 21:29:33.901656 coreos-metadata[1422]: Apr 12 21:29:33.901 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:29:33.907162 dbus-daemon[1428]: [system] SELinux support is enabled Apr 12 21:29:33.907356 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 21:29:33.907970 systemd[1]: Starting motdgen.service... Apr 12 21:29:33.908674 extend-filesystems[1430]: Found sda Apr 12 21:29:33.908674 extend-filesystems[1430]: Found sda1 Apr 12 21:29:33.952355 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Apr 12 21:29:33.916036 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 21:29:33.952539 coreos-metadata[1425]: Apr 12 21:29:33.909 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:29:33.952644 extend-filesystems[1430]: Found sda2 Apr 12 21:29:33.952644 extend-filesystems[1430]: Found sda3 Apr 12 21:29:33.952644 extend-filesystems[1430]: Found usr Apr 12 21:29:33.952644 extend-filesystems[1430]: Found sda4 Apr 12 21:29:33.952644 extend-filesystems[1430]: Found sda6 Apr 12 21:29:33.952644 extend-filesystems[1430]: Found sda7 Apr 12 21:29:33.952644 extend-filesystems[1430]: Found sda9 Apr 12 21:29:33.952644 extend-filesystems[1430]: Checking size of /dev/sda9 Apr 12 21:29:33.952644 extend-filesystems[1430]: Resized partition /dev/sda9 Apr 12 21:29:33.946066 systemd[1]: Starting prepare-critools.service... Apr 12 21:29:34.053573 extend-filesystems[1446]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 21:29:33.960815 systemd[1]: Starting prepare-helm.service... Apr 12 21:29:33.979788 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 21:29:33.998868 systemd[1]: Starting sshd-keygen.service... Apr 12 21:29:34.018733 systemd[1]: Starting systemd-logind.service... Apr 12 21:29:34.032276 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:29:34.032828 systemd[1]: Starting tcsd.service... Apr 12 21:29:34.068736 jq[1462]: true Apr 12 21:29:34.039640 systemd-logind[1459]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 21:29:34.039651 systemd-logind[1459]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 21:29:34.039660 systemd-logind[1459]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 21:29:34.039761 systemd-logind[1459]: New seat seat0. Apr 12 21:29:34.045634 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 21:29:34.045997 systemd[1]: Starting update-engine.service... Apr 12 21:29:34.060810 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 21:29:34.076587 systemd[1]: Started dbus.service. Apr 12 21:29:34.084965 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 21:29:34.085050 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 21:29:34.085225 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 21:29:34.085302 systemd[1]: Finished motdgen.service. Apr 12 21:29:34.091315 update_engine[1461]: I0412 21:29:34.090853 1461 main.cc:92] Flatcar Update Engine starting Apr 12 21:29:34.093312 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 21:29:34.093395 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 21:29:34.094057 update_engine[1461]: I0412 21:29:34.094049 1461 update_check_scheduler.cc:74] Next update check in 9m40s Apr 12 21:29:34.097975 tar[1464]: ./ Apr 12 21:29:34.097975 tar[1464]: ./loopback Apr 12 21:29:34.104030 jq[1470]: true Apr 12 21:29:34.105252 dbus-daemon[1428]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 21:29:34.106079 tar[1465]: crictl Apr 12 21:29:34.107362 tar[1466]: linux-amd64/helm Apr 12 21:29:34.109752 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 21:29:34.109852 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 21:29:34.109938 systemd[1]: Started update-engine.service. Apr 12 21:29:34.113132 env[1471]: time="2024-04-12T21:29:34.113110230Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 21:29:34.119635 tar[1464]: ./bandwidth Apr 12 21:29:34.122158 systemd[1]: Started systemd-logind.service. Apr 12 21:29:34.123021 env[1471]: time="2024-04-12T21:29:34.122986795Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 21:29:34.123076 env[1471]: time="2024-04-12T21:29:34.123064764Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:29:34.123717 env[1471]: time="2024-04-12T21:29:34.123695756Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:29:34.123751 env[1471]: time="2024-04-12T21:29:34.123716594Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:29:34.123900 env[1471]: time="2024-04-12T21:29:34.123859153Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:29:34.123900 env[1471]: time="2024-04-12T21:29:34.123873637Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 21:29:34.123900 env[1471]: time="2024-04-12T21:29:34.123883559Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 21:29:34.123900 env[1471]: time="2024-04-12T21:29:34.123891688Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 21:29:34.123981 env[1471]: time="2024-04-12T21:29:34.123950830Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:29:34.124114 env[1471]: time="2024-04-12T21:29:34.124104354Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:29:34.124225 env[1471]: time="2024-04-12T21:29:34.124199877Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:29:34.124251 env[1471]: time="2024-04-12T21:29:34.124226386Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 21:29:34.124315 env[1471]: time="2024-04-12T21:29:34.124267196Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 21:29:34.124315 env[1471]: time="2024-04-12T21:29:34.124278845Z" level=info msg="metadata content store policy set" policy=shared Apr 12 21:29:34.132995 systemd[1]: Started locksmithd.service. Apr 12 21:29:34.139349 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 21:29:34.139430 systemd[1]: Reached target system-config.target. Apr 12 21:29:34.147326 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 21:29:34.147399 systemd[1]: Reached target user-config.target. Apr 12 21:29:34.169670 env[1471]: time="2024-04-12T21:29:34.169603320Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 21:29:34.169670 env[1471]: time="2024-04-12T21:29:34.169632928Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 21:29:34.169670 env[1471]: time="2024-04-12T21:29:34.169645543Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169670221Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169680193Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169688156Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169695465Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169703202Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169710148Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169717782Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169724618Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174018 env[1471]: time="2024-04-12T21:29:34.169731082Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 21:29:34.174240 env[1471]: time="2024-04-12T21:29:34.174185018Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 21:29:34.174371 env[1471]: time="2024-04-12T21:29:34.174359729Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 21:29:34.174507 bash[1496]: Updated "/home/core/.ssh/authorized_keys" Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174500184Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174516665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174525002Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174554356Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174562247Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174570380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174576716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174583633Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174589862Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174596176Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174602528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174613 env[1471]: time="2024-04-12T21:29:34.174611237Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174699226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174712499Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174723878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174734682Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174746953Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174758908Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174774178Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 21:29:34.174808 env[1471]: time="2024-04-12T21:29:34.174801838Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 21:29:34.174939 env[1471]: time="2024-04-12T21:29:34.174915519Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.174947683Z" level=info msg="Connect containerd service" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.174966957Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175248295Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175332816Z" level=info msg="Start subscribing containerd event" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175373573Z" level=info msg="Start recovering state" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175374783Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175397999Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175407819Z" level=info msg="Start event monitor" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175415315Z" level=info msg="Start snapshots syncer" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175420553Z" level=info msg="Start cni network conf syncer for default" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175424580Z" level=info msg="Start streaming server" Apr 12 21:29:34.176968 env[1471]: time="2024-04-12T21:29:34.175423610Z" level=info msg="containerd successfully booted in 0.062652s" Apr 12 21:29:34.174951 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 21:29:34.184477 systemd[1]: Started containerd.service. Apr 12 21:29:34.188788 tar[1464]: ./ptp Apr 12 21:29:34.195095 locksmithd[1504]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 21:29:34.218017 tar[1464]: ./vlan Apr 12 21:29:34.243130 tar[1464]: ./host-device Apr 12 21:29:34.264366 tar[1464]: ./tuning Apr 12 21:29:34.283153 tar[1464]: ./vrf Apr 12 21:29:34.302808 tar[1464]: ./sbr Apr 12 21:29:34.322053 tar[1464]: ./tap Apr 12 21:29:34.344070 tar[1464]: ./dhcp Apr 12 21:29:34.393239 tar[1466]: linux-amd64/LICENSE Apr 12 21:29:34.393323 tar[1466]: linux-amd64/README.md Apr 12 21:29:34.395738 systemd[1]: Finished prepare-helm.service. Apr 12 21:29:34.400076 tar[1464]: ./static Apr 12 21:29:34.415665 systemd[1]: Finished prepare-critools.service. Apr 12 21:29:34.415990 tar[1464]: ./firewall Apr 12 21:29:34.440364 tar[1464]: ./macvlan Apr 12 21:29:34.462355 tar[1464]: ./dummy Apr 12 21:29:34.484007 tar[1464]: ./bridge Apr 12 21:29:34.507821 tar[1464]: ./ipvlan Apr 12 21:29:34.529828 tar[1464]: ./portmap Apr 12 21:29:34.550539 tar[1464]: ./host-local Apr 12 21:29:34.574332 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 21:29:34.775326 systemd-networkd[1325]: bond0: Gained IPv6LL Apr 12 21:29:34.879674 sshd_keygen[1458]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 21:29:34.891349 systemd[1]: Finished sshd-keygen.service. Apr 12 21:29:34.900084 systemd[1]: Starting issuegen.service... Apr 12 21:29:34.908496 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 21:29:34.908568 systemd[1]: Finished issuegen.service. Apr 12 21:29:34.917043 systemd[1]: Starting systemd-user-sessions.service... Apr 12 21:29:34.925532 systemd[1]: Finished systemd-user-sessions.service. Apr 12 21:29:34.933979 systemd[1]: Started getty@tty1.service. Apr 12 21:29:34.940938 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 21:29:34.949427 systemd[1]: Reached target getty.target. Apr 12 21:29:35.383292 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Apr 12 21:29:35.412468 extend-filesystems[1446]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 21:29:35.412468 extend-filesystems[1446]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 21:29:35.412468 extend-filesystems[1446]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Apr 12 21:29:35.451333 extend-filesystems[1430]: Resized filesystem in /dev/sda9 Apr 12 21:29:35.451333 extend-filesystems[1430]: Found sdb Apr 12 21:29:35.412966 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 21:29:35.413057 systemd[1]: Finished extend-filesystems.service. Apr 12 21:29:35.889419 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 21:29:39.832738 coreos-metadata[1425]: Apr 12 21:29:39.832 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 21:29:39.833531 coreos-metadata[1422]: Apr 12 21:29:39.832 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 21:29:39.982069 login[1531]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 21:29:39.991540 login[1530]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 21:29:39.995112 systemd-logind[1459]: New session 1 of user core. Apr 12 21:29:39.996030 systemd[1]: Created slice user-500.slice. Apr 12 21:29:39.996879 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 21:29:39.998850 systemd-logind[1459]: New session 2 of user core. Apr 12 21:29:40.004302 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 21:29:40.005192 systemd[1]: Starting user@500.service... Apr 12 21:29:40.007676 (systemd)[1536]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:40.097053 systemd[1536]: Queued start job for default target default.target. Apr 12 21:29:40.097289 systemd[1536]: Reached target paths.target. Apr 12 21:29:40.097300 systemd[1536]: Reached target sockets.target. Apr 12 21:29:40.097308 systemd[1536]: Reached target timers.target. Apr 12 21:29:40.097315 systemd[1536]: Reached target basic.target. Apr 12 21:29:40.097335 systemd[1536]: Reached target default.target. Apr 12 21:29:40.097350 systemd[1536]: Startup finished in 85ms. Apr 12 21:29:40.097399 systemd[1]: Started user@500.service. Apr 12 21:29:40.097934 systemd[1]: Started session-1.scope. Apr 12 21:29:40.098251 systemd[1]: Started session-2.scope. Apr 12 21:29:40.833260 coreos-metadata[1425]: Apr 12 21:29:40.833 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 21:29:40.834118 coreos-metadata[1422]: Apr 12 21:29:40.833 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 21:29:41.142288 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Apr 12 21:29:41.149269 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Apr 12 21:29:41.888907 systemd[1]: Created slice system-sshd.slice. Apr 12 21:29:41.889573 systemd[1]: Started sshd@0-139.178.89.153:22-147.75.109.163:45332.service. Apr 12 21:29:41.904009 coreos-metadata[1422]: Apr 12 21:29:41.903 INFO Fetch successful Apr 12 21:29:41.904171 coreos-metadata[1425]: Apr 12 21:29:41.904 INFO Fetch successful Apr 12 21:29:41.927878 systemd[1]: Finished coreos-metadata.service. Apr 12 21:29:41.928905 unknown[1422]: wrote ssh authorized keys file for user: core Apr 12 21:29:41.928952 systemd[1]: Started packet-phone-home.service. Apr 12 21:29:41.935651 curl[1562]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 21:29:41.935801 curl[1562]: Dload Upload Total Spent Left Speed Apr 12 21:29:41.937571 sshd[1558]: Accepted publickey for core from 147.75.109.163 port 45332 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:41.938332 sshd[1558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:41.940560 systemd-logind[1459]: New session 3 of user core. Apr 12 21:29:41.941248 systemd[1]: Started session-3.scope. Apr 12 21:29:41.941568 update-ssh-keys[1563]: Updated "/home/core/.ssh/authorized_keys" Apr 12 21:29:41.941784 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 21:29:41.942021 systemd[1]: Reached target multi-user.target. Apr 12 21:29:41.942778 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 21:29:41.946646 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 21:29:41.946717 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 21:29:41.953543 systemd[1]: Startup finished in 1.851s (kernel) + 39.483s (initrd) + 14.639s (userspace) = 55.974s. Apr 12 21:29:41.993864 systemd[1]: Started sshd@1-139.178.89.153:22-147.75.109.163:45334.service. Apr 12 21:29:42.025181 sshd[1568]: Accepted publickey for core from 147.75.109.163 port 45334 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:42.025899 sshd[1568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:42.028165 systemd-logind[1459]: New session 4 of user core. Apr 12 21:29:42.028904 systemd[1]: Started session-4.scope. Apr 12 21:29:42.076836 sshd[1568]: pam_unix(sshd:session): session closed for user core Apr 12 21:29:42.078646 systemd[1]: sshd@1-139.178.89.153:22-147.75.109.163:45334.service: Deactivated successfully. Apr 12 21:29:42.079037 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 21:29:42.079417 systemd-logind[1459]: Session 4 logged out. Waiting for processes to exit. Apr 12 21:29:42.080049 systemd[1]: Started sshd@2-139.178.89.153:22-147.75.109.163:45346.service. Apr 12 21:29:42.080572 systemd-logind[1459]: Removed session 4. Apr 12 21:29:42.107643 curl[1562]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 21:29:42.108415 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 21:29:42.113729 sshd[1574]: Accepted publickey for core from 147.75.109.163 port 45346 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:42.115076 sshd[1574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:42.119759 systemd-logind[1459]: New session 5 of user core. Apr 12 21:29:42.121601 systemd[1]: Started session-5.scope. Apr 12 21:29:42.180983 sshd[1574]: pam_unix(sshd:session): session closed for user core Apr 12 21:29:42.182967 systemd[1]: sshd@2-139.178.89.153:22-147.75.109.163:45346.service: Deactivated successfully. Apr 12 21:29:42.183361 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 21:29:42.183746 systemd-logind[1459]: Session 5 logged out. Waiting for processes to exit. Apr 12 21:29:42.184317 systemd[1]: Started sshd@3-139.178.89.153:22-147.75.109.163:45360.service. Apr 12 21:29:42.184805 systemd-logind[1459]: Removed session 5. Apr 12 21:29:42.203653 systemd-timesyncd[1414]: Contacted time server 50.203.248.23:123 (0.flatcar.pool.ntp.org). Apr 12 21:29:42.203700 systemd-timesyncd[1414]: Initial clock synchronization to Fri 2024-04-12 21:29:42.266652 UTC. Apr 12 21:29:42.217287 sshd[1580]: Accepted publickey for core from 147.75.109.163 port 45360 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:42.218429 sshd[1580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:42.222321 systemd-logind[1459]: New session 6 of user core. Apr 12 21:29:42.223782 systemd[1]: Started session-6.scope. Apr 12 21:29:42.293128 sshd[1580]: pam_unix(sshd:session): session closed for user core Apr 12 21:29:42.301754 systemd[1]: sshd@3-139.178.89.153:22-147.75.109.163:45360.service: Deactivated successfully. Apr 12 21:29:42.303858 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 21:29:42.305866 systemd-logind[1459]: Session 6 logged out. Waiting for processes to exit. Apr 12 21:29:42.309035 systemd[1]: Started sshd@4-139.178.89.153:22-147.75.109.163:45368.service. Apr 12 21:29:42.311346 systemd-logind[1459]: Removed session 6. Apr 12 21:29:42.378711 sshd[1586]: Accepted publickey for core from 147.75.109.163 port 45368 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:42.382025 sshd[1586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:42.392337 systemd-logind[1459]: New session 7 of user core. Apr 12 21:29:42.394773 systemd[1]: Started session-7.scope. Apr 12 21:29:42.508789 sudo[1589]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 21:29:42.509439 sudo[1589]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:29:42.526685 dbus-daemon[1428]: \xd0}\u0004\x8d\xdfU: received setenforce notice (enforcing=-1299624080) Apr 12 21:29:42.531377 sudo[1589]: pam_unix(sudo:session): session closed for user root Apr 12 21:29:42.536773 sshd[1586]: pam_unix(sshd:session): session closed for user core Apr 12 21:29:42.543959 systemd[1]: sshd@4-139.178.89.153:22-147.75.109.163:45368.service: Deactivated successfully. Apr 12 21:29:42.544579 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 21:29:42.544984 systemd-logind[1459]: Session 7 logged out. Waiting for processes to exit. Apr 12 21:29:42.545494 systemd[1]: Started sshd@5-139.178.89.153:22-147.75.109.163:45378.service. Apr 12 21:29:42.545944 systemd-logind[1459]: Removed session 7. Apr 12 21:29:42.576314 sshd[1593]: Accepted publickey for core from 147.75.109.163 port 45378 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:42.577089 sshd[1593]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:42.579790 systemd-logind[1459]: New session 8 of user core. Apr 12 21:29:42.580264 systemd[1]: Started session-8.scope. Apr 12 21:29:42.644219 sudo[1598]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 21:29:42.644860 sudo[1598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:29:42.652219 sudo[1598]: pam_unix(sudo:session): session closed for user root Apr 12 21:29:42.664668 sudo[1597]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 21:29:42.665311 sudo[1597]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:29:42.690119 systemd[1]: Stopping audit-rules.service... Apr 12 21:29:42.691000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 21:29:42.693455 auditctl[1601]: No rules Apr 12 21:29:42.694325 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 21:29:42.694749 systemd[1]: Stopped audit-rules.service. Apr 12 21:29:42.698800 kernel: kauditd_printk_skb: 96 callbacks suppressed Apr 12 21:29:42.698908 kernel: audit: type=1305 audit(1712957382.691:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 21:29:42.698644 systemd[1]: Starting audit-rules.service... Apr 12 21:29:42.711877 augenrules[1618]: No rules Apr 12 21:29:42.712372 systemd[1]: Finished audit-rules.service. Apr 12 21:29:42.712901 sudo[1597]: pam_unix(sudo:session): session closed for user root Apr 12 21:29:42.691000 audit[1601]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd97fb82f0 a2=420 a3=0 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:42.713775 sshd[1593]: pam_unix(sshd:session): session closed for user core Apr 12 21:29:42.716135 systemd[1]: sshd@5-139.178.89.153:22-147.75.109.163:45378.service: Deactivated successfully. Apr 12 21:29:42.716711 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 21:29:42.717154 systemd-logind[1459]: Session 8 logged out. Waiting for processes to exit. Apr 12 21:29:42.718250 systemd[1]: Started sshd@6-139.178.89.153:22-147.75.109.163:45394.service. Apr 12 21:29:42.718949 systemd-logind[1459]: Removed session 8. Apr 12 21:29:42.745458 kernel: audit: type=1300 audit(1712957382.691:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd97fb82f0 a2=420 a3=0 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:42.745510 kernel: audit: type=1327 audit(1712957382.691:160): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 21:29:42.691000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 21:29:42.755028 kernel: audit: type=1131 audit(1712957382.693:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.777417 kernel: audit: type=1130 audit(1712957382.711:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.799862 kernel: audit: type=1106 audit(1712957382.711:163): pid=1597 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.711000 audit[1597]: USER_END pid=1597 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.801868 sshd[1624]: Accepted publickey for core from 147.75.109.163 port 45394 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:29:42.802516 sshd[1624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:29:42.804830 systemd-logind[1459]: New session 9 of user core. Apr 12 21:29:42.805279 systemd[1]: Started session-9.scope. Apr 12 21:29:42.825830 kernel: audit: type=1104 audit(1712957382.711:164): pid=1597 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.711000 audit[1597]: CRED_DISP pid=1597 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.849365 kernel: audit: type=1106 audit(1712957382.713:165): pid=1593 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.713000 audit[1593]: USER_END pid=1593 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.852686 sudo[1627]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 21:29:42.852799 sudo[1627]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:29:42.713000 audit[1593]: CRED_DISP pid=1593 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.882341 kernel: audit: type=1104 audit(1712957382.713:166): pid=1593 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.89.153:22-147.75.109.163:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.933132 kernel: audit: type=1131 audit(1712957382.715:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.89.153:22-147.75.109.163:45378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.153:22-147.75.109.163:45394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.801000 audit[1624]: USER_ACCT pid=1624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.801000 audit[1624]: CRED_ACQ pid=1624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.801000 audit[1624]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b9bfcf0 a2=3 a3=0 items=0 ppid=1 pid=1624 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:42.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:29:42.806000 audit[1624]: USER_START pid=1624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.807000 audit[1626]: CRED_ACQ pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:29:42.851000 audit[1627]: USER_ACCT pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.851000 audit[1627]: CRED_REFR pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:42.852000 audit[1627]: USER_START pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:29:43.747899 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 21:29:43.751770 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 21:29:43.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:43.751970 systemd[1]: Reached target network-online.target. Apr 12 21:29:43.752654 systemd[1]: Starting docker.service... Apr 12 21:29:43.770884 env[1649]: time="2024-04-12T21:29:43.770825966Z" level=info msg="Starting up" Apr 12 21:29:43.771621 env[1649]: time="2024-04-12T21:29:43.771589320Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 21:29:43.771621 env[1649]: time="2024-04-12T21:29:43.771597938Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 21:29:43.771676 env[1649]: time="2024-04-12T21:29:43.771624665Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 21:29:43.771676 env[1649]: time="2024-04-12T21:29:43.771630643Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 21:29:43.772551 env[1649]: time="2024-04-12T21:29:43.772517748Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 21:29:43.772551 env[1649]: time="2024-04-12T21:29:43.772526467Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 21:29:43.772551 env[1649]: time="2024-04-12T21:29:43.772534042Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 21:29:43.772551 env[1649]: time="2024-04-12T21:29:43.772538942Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 21:29:43.930018 env[1649]: time="2024-04-12T21:29:43.929971853Z" level=info msg="Loading containers: start." Apr 12 21:29:43.968000 audit[1692]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:43.968000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc58c4fc90 a2=0 a3=7ffc58c4fc7c items=0 ppid=1649 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:43.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 21:29:43.969000 audit[1694]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:43.969000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd1f82ef30 a2=0 a3=7ffd1f82ef1c items=0 ppid=1649 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:43.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 21:29:43.970000 audit[1696]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:43.970000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc3a486b60 a2=0 a3=7ffc3a486b4c items=0 ppid=1649 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:43.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 21:29:43.971000 audit[1698]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:43.971000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd114db780 a2=0 a3=7ffd114db76c items=0 ppid=1649 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:43.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 21:29:43.972000 audit[1700]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:43.972000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcfba82d20 a2=0 a3=7ffcfba82d0c items=0 ppid=1649 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:43.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 21:29:44.000000 audit[1705]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.000000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff44d7ff90 a2=0 a3=7fff44d7ff7c items=0 ppid=1649 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.000000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 21:29:44.004000 audit[1707]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.004000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff95e95760 a2=0 a3=7fff95e9574c items=0 ppid=1649 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 21:29:44.005000 audit[1709]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.005000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcff3b2e70 a2=0 a3=7ffcff3b2e5c items=0 ppid=1649 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 21:29:44.007000 audit[1711]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.007000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe5d1a0180 a2=0 a3=7ffe5d1a016c items=0 ppid=1649 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:29:44.013000 audit[1715]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.013000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcbb398c70 a2=0 a3=7ffcbb398c5c items=0 ppid=1649 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:29:44.014000 audit[1717]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.014000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffad2d3590 a2=0 a3=7fffad2d357c items=0 ppid=1649 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:29:44.031326 kernel: Initializing XFRM netlink socket Apr 12 21:29:44.053605 env[1649]: time="2024-04-12T21:29:44.053560686Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 21:29:44.063000 audit[1725]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.063000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffde950a360 a2=0 a3=7ffde950a34c items=0 ppid=1649 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 21:29:44.099000 audit[1728]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.099000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe6aa45490 a2=0 a3=7ffe6aa4547c items=0 ppid=1649 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 21:29:44.107000 audit[1731]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.107000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeff01b480 a2=0 a3=7ffeff01b46c items=0 ppid=1649 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 21:29:44.113000 audit[1733]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.113000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd212bd3e0 a2=0 a3=7ffd212bd3cc items=0 ppid=1649 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 21:29:44.119000 audit[1735]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.119000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdbf2ead70 a2=0 a3=7ffdbf2ead5c items=0 ppid=1649 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 21:29:44.124000 audit[1737]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.124000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd4d67bcc0 a2=0 a3=7ffd4d67bcac items=0 ppid=1649 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 21:29:44.131000 audit[1739]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.131000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcd1f2e370 a2=0 a3=7ffcd1f2e35c items=0 ppid=1649 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 21:29:44.155000 audit[1742]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.155000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffffc0f9d30 a2=0 a3=7ffffc0f9d1c items=0 ppid=1649 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.155000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 21:29:44.161000 audit[1744]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.161000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe4f785390 a2=0 a3=7ffe4f78537c items=0 ppid=1649 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 21:29:44.166000 audit[1746]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.166000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe4f8d5310 a2=0 a3=7ffe4f8d52fc items=0 ppid=1649 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.166000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 21:29:44.172000 audit[1748]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.172000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd41e50320 a2=0 a3=7ffd41e5030c items=0 ppid=1649 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 21:29:44.173682 systemd-networkd[1325]: docker0: Link UP Apr 12 21:29:44.187000 audit[1752]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.187000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca15a3520 a2=0 a3=7ffca15a350c items=0 ppid=1649 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.187000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:29:44.190000 audit[1753]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:44.190000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe5c528ce0 a2=0 a3=7ffe5c528ccc items=0 ppid=1649 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:44.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:29:44.192720 env[1649]: time="2024-04-12T21:29:44.192627142Z" level=info msg="Loading containers: done." Apr 12 21:29:44.214418 env[1649]: time="2024-04-12T21:29:44.214374690Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 21:29:44.214490 env[1649]: time="2024-04-12T21:29:44.214459291Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 21:29:44.214514 env[1649]: time="2024-04-12T21:29:44.214502888Z" level=info msg="Daemon has completed initialization" Apr 12 21:29:44.220835 systemd[1]: Started docker.service. Apr 12 21:29:44.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:44.223760 env[1649]: time="2024-04-12T21:29:44.223712918Z" level=info msg="API listen on /run/docker.sock" Apr 12 21:29:44.234348 systemd[1]: Reloading. Apr 12 21:29:44.266885 /usr/lib/systemd/system-generators/torcx-generator[1804]: time="2024-04-12T21:29:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:29:44.266904 /usr/lib/systemd/system-generators/torcx-generator[1804]: time="2024-04-12T21:29:44Z" level=info msg="torcx already run" Apr 12 21:29:44.346164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:29:44.346176 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:29:44.361973 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit: BPF prog-id=31 op=LOAD Apr 12 21:29:44.405000 audit: BPF prog-id=21 op=UNLOAD Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit: BPF prog-id=32 op=LOAD Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.405000 audit: BPF prog-id=33 op=LOAD Apr 12 21:29:44.405000 audit: BPF prog-id=22 op=UNLOAD Apr 12 21:29:44.405000 audit: BPF prog-id=23 op=UNLOAD Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit: BPF prog-id=34 op=LOAD Apr 12 21:29:44.407000 audit: BPF prog-id=25 op=UNLOAD Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.407000 audit: BPF prog-id=35 op=LOAD Apr 12 21:29:44.407000 audit: BPF prog-id=24 op=UNLOAD Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit: BPF prog-id=36 op=LOAD Apr 12 21:29:44.408000 audit: BPF prog-id=15 op=UNLOAD Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit: BPF prog-id=37 op=LOAD Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.408000 audit: BPF prog-id=38 op=LOAD Apr 12 21:29:44.408000 audit: BPF prog-id=16 op=UNLOAD Apr 12 21:29:44.408000 audit: BPF prog-id=17 op=UNLOAD Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit: BPF prog-id=39 op=LOAD Apr 12 21:29:44.409000 audit: BPF prog-id=20 op=UNLOAD Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.409000 audit: BPF prog-id=40 op=LOAD Apr 12 21:29:44.409000 audit: BPF prog-id=29 op=UNLOAD Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit: BPF prog-id=41 op=LOAD Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit: BPF prog-id=42 op=LOAD Apr 12 21:29:44.410000 audit: BPF prog-id=18 op=UNLOAD Apr 12 21:29:44.410000 audit: BPF prog-id=19 op=UNLOAD Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit: BPF prog-id=43 op=LOAD Apr 12 21:29:44.411000 audit: BPF prog-id=26 op=UNLOAD Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit: BPF prog-id=44 op=LOAD Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:44.411000 audit: BPF prog-id=45 op=LOAD Apr 12 21:29:44.411000 audit: BPF prog-id=27 op=UNLOAD Apr 12 21:29:44.411000 audit: BPF prog-id=28 op=UNLOAD Apr 12 21:29:44.416626 systemd[1]: Started kubelet.service. Apr 12 21:29:44.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:44.441659 kubelet[1862]: E0412 21:29:44.441579 1862 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 21:29:44.442850 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 21:29:44.442928 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 21:29:44.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:29:45.297332 env[1471]: time="2024-04-12T21:29:45.297180505Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\"" Apr 12 21:29:45.869037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1925698231.mount: Deactivated successfully. Apr 12 21:29:47.126066 env[1471]: time="2024-04-12T21:29:47.126015505Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:47.126864 env[1471]: time="2024-04-12T21:29:47.126824813Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:47.127806 env[1471]: time="2024-04-12T21:29:47.127766063Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:47.128786 env[1471]: time="2024-04-12T21:29:47.128741919Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cf0c29f585316888225cf254949988bdbedc7ba6238bc9a24bf6f0c508c42b6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:47.129395 env[1471]: time="2024-04-12T21:29:47.129351366Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\" returns image reference \"sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809\"" Apr 12 21:29:47.135729 env[1471]: time="2024-04-12T21:29:47.135712153Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\"" Apr 12 21:29:48.526752 env[1471]: time="2024-04-12T21:29:48.526723624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:48.527438 env[1471]: time="2024-04-12T21:29:48.527425313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:48.528351 env[1471]: time="2024-04-12T21:29:48.528339378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:48.529824 env[1471]: time="2024-04-12T21:29:48.529811445Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6caa3a4278e87169371d031861e49db21742bcbd8df650d7fe519a1a7f6764af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:48.530115 env[1471]: time="2024-04-12T21:29:48.530102203Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\" returns image reference \"sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7\"" Apr 12 21:29:48.536348 env[1471]: time="2024-04-12T21:29:48.536325153Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\"" Apr 12 21:29:49.532048 env[1471]: time="2024-04-12T21:29:49.531995463Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:49.532729 env[1471]: time="2024-04-12T21:29:49.532688150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:49.533747 env[1471]: time="2024-04-12T21:29:49.533697123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:49.535031 env[1471]: time="2024-04-12T21:29:49.534975339Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b8bb7b17a4f915419575ceb885e128d0bb5ea8e67cb88dbde257988b770a4dce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:49.535389 env[1471]: time="2024-04-12T21:29:49.535343662Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\" returns image reference \"sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833\"" Apr 12 21:29:49.540858 env[1471]: time="2024-04-12T21:29:49.540840519Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 21:29:50.546500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2562739739.mount: Deactivated successfully. Apr 12 21:29:50.871995 env[1471]: time="2024-04-12T21:29:50.871902720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:50.874662 env[1471]: time="2024-04-12T21:29:50.874645740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:50.890513 env[1471]: time="2024-04-12T21:29:50.890412355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:50.893921 env[1471]: time="2024-04-12T21:29:50.893840998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:50.895696 env[1471]: time="2024-04-12T21:29:50.895613819Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\"" Apr 12 21:29:50.907641 env[1471]: time="2024-04-12T21:29:50.907622752Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 21:29:51.481929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2386059117.mount: Deactivated successfully. Apr 12 21:29:51.483064 env[1471]: time="2024-04-12T21:29:51.483010868Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:51.483706 env[1471]: time="2024-04-12T21:29:51.483663934Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:51.484442 env[1471]: time="2024-04-12T21:29:51.484396346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:51.485094 env[1471]: time="2024-04-12T21:29:51.485046495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:51.485700 env[1471]: time="2024-04-12T21:29:51.485655945Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 21:29:51.490986 env[1471]: time="2024-04-12T21:29:51.490971429Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Apr 12 21:29:52.182963 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1080806573.mount: Deactivated successfully. Apr 12 21:29:54.646169 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 21:29:54.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:54.646332 systemd[1]: Stopped kubelet.service. Apr 12 21:29:54.647177 systemd[1]: Started kubelet.service. Apr 12 21:29:54.651942 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 21:29:54.651982 kernel: audit: type=1130 audit(1712957394.645:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:54.673160 kubelet[1958]: E0412 21:29:54.673087 1958 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 21:29:54.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:54.675418 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 21:29:54.675489 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 21:29:54.729227 kernel: audit: type=1131 audit(1712957394.645:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:54.729265 kernel: audit: type=1130 audit(1712957394.646:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:54.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:54.784628 kernel: audit: type=1131 audit(1712957394.674:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:29:54.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:29:55.293574 env[1471]: time="2024-04-12T21:29:55.293520014Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:55.294187 env[1471]: time="2024-04-12T21:29:55.294149572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:55.294986 env[1471]: time="2024-04-12T21:29:55.294940659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:55.296988 env[1471]: time="2024-04-12T21:29:55.296945798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:55.297417 env[1471]: time="2024-04-12T21:29:55.297381976Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Apr 12 21:29:55.303367 env[1471]: time="2024-04-12T21:29:55.303302370Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 21:29:55.967054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1777041279.mount: Deactivated successfully. Apr 12 21:29:56.432660 env[1471]: time="2024-04-12T21:29:56.432636649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:56.433199 env[1471]: time="2024-04-12T21:29:56.433167372Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:56.434003 env[1471]: time="2024-04-12T21:29:56.433986001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:56.435070 env[1471]: time="2024-04-12T21:29:56.435040730Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:29:56.435370 env[1471]: time="2024-04-12T21:29:56.435357034Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 21:29:58.513949 systemd[1]: Stopped kubelet.service. Apr 12 21:29:58.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:58.523396 systemd[1]: Reloading. Apr 12 21:29:58.551644 /usr/lib/systemd/system-generators/torcx-generator[2130]: time="2024-04-12T21:29:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:29:58.551668 /usr/lib/systemd/system-generators/torcx-generator[2130]: time="2024-04-12T21:29:58Z" level=info msg="torcx already run" Apr 12 21:29:58.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:58.574299 kernel: audit: type=1130 audit(1712957398.513:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:58.574354 kernel: audit: type=1131 audit(1712957398.513:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:58.653669 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:29:58.653677 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:29:58.665824 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.834902 kernel: audit: type=1400 audit(1712957398.712:383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.834945 kernel: audit: type=1400 audit(1712957398.712:384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.834958 kernel: audit: type=1400 audit(1712957398.712:385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.898240 kernel: audit: type=1400 audit(1712957398.712:386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit: BPF prog-id=46 op=LOAD Apr 12 21:29:58.833000 audit: BPF prog-id=31 op=UNLOAD Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit: BPF prog-id=47 op=LOAD Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.960000 audit: BPF prog-id=48 op=LOAD Apr 12 21:29:58.960000 audit: BPF prog-id=32 op=UNLOAD Apr 12 21:29:58.960000 audit: BPF prog-id=33 op=UNLOAD Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.961000 audit: BPF prog-id=49 op=LOAD Apr 12 21:29:58.961000 audit: BPF prog-id=34 op=UNLOAD Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit: BPF prog-id=50 op=LOAD Apr 12 21:29:58.962000 audit: BPF prog-id=35 op=UNLOAD Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit: BPF prog-id=51 op=LOAD Apr 12 21:29:58.962000 audit: BPF prog-id=36 op=UNLOAD Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit: BPF prog-id=52 op=LOAD Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit: BPF prog-id=53 op=LOAD Apr 12 21:29:58.963000 audit: BPF prog-id=37 op=UNLOAD Apr 12 21:29:58.963000 audit: BPF prog-id=38 op=UNLOAD Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.963000 audit: BPF prog-id=54 op=LOAD Apr 12 21:29:58.963000 audit: BPF prog-id=39 op=UNLOAD Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit: BPF prog-id=55 op=LOAD Apr 12 21:29:58.964000 audit: BPF prog-id=40 op=UNLOAD Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit: BPF prog-id=56 op=LOAD Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.964000 audit: BPF prog-id=57 op=LOAD Apr 12 21:29:58.964000 audit: BPF prog-id=41 op=UNLOAD Apr 12 21:29:58.964000 audit: BPF prog-id=42 op=UNLOAD Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit: BPF prog-id=58 op=LOAD Apr 12 21:29:58.965000 audit: BPF prog-id=43 op=UNLOAD Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit: BPF prog-id=59 op=LOAD Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:58.965000 audit: BPF prog-id=60 op=LOAD Apr 12 21:29:58.965000 audit: BPF prog-id=44 op=UNLOAD Apr 12 21:29:58.965000 audit: BPF prog-id=45 op=UNLOAD Apr 12 21:29:58.973384 systemd[1]: Started kubelet.service. Apr 12 21:29:58.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:29:58.994846 kubelet[2189]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:29:58.994846 kubelet[2189]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 21:29:58.994846 kubelet[2189]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:29:58.995071 kubelet[2189]: I0412 21:29:58.994873 2189 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 21:29:59.494513 kubelet[2189]: I0412 21:29:59.494496 2189 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 21:29:59.494513 kubelet[2189]: I0412 21:29:59.494510 2189 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 21:29:59.494894 kubelet[2189]: I0412 21:29:59.494879 2189 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 21:29:59.497059 kubelet[2189]: I0412 21:29:59.497022 2189 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 21:29:59.497614 kubelet[2189]: E0412 21:29:59.497575 2189 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.89.153:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.515023 kubelet[2189]: I0412 21:29:59.514986 2189 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 21:29:59.515099 kubelet[2189]: I0412 21:29:59.515094 2189 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 21:29:59.515145 kubelet[2189]: I0412 21:29:59.515141 2189 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 21:29:59.515207 kubelet[2189]: I0412 21:29:59.515151 2189 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 21:29:59.515207 kubelet[2189]: I0412 21:29:59.515157 2189 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 21:29:59.515207 kubelet[2189]: I0412 21:29:59.515197 2189 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:29:59.516715 kubelet[2189]: I0412 21:29:59.516709 2189 kubelet.go:405] "Attempting to sync node with API server" Apr 12 21:29:59.516738 kubelet[2189]: I0412 21:29:59.516720 2189 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 21:29:59.516738 kubelet[2189]: I0412 21:29:59.516729 2189 kubelet.go:309] "Adding apiserver pod source" Apr 12 21:29:59.516738 kubelet[2189]: I0412 21:29:59.516737 2189 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 21:29:59.517128 kubelet[2189]: I0412 21:29:59.517117 2189 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 21:29:59.517161 kubelet[2189]: W0412 21:29:59.517118 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.89.153:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-97ccf21113&limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.517161 kubelet[2189]: E0412 21:29:59.517141 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.89.153:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-97ccf21113&limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.517203 kubelet[2189]: W0412 21:29:59.517158 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.89.153:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.517203 kubelet[2189]: E0412 21:29:59.517174 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.89.153:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.517318 kubelet[2189]: W0412 21:29:59.517309 2189 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 21:29:59.517645 kubelet[2189]: I0412 21:29:59.517589 2189 server.go:1168] "Started kubelet" Apr 12 21:29:59.517707 kubelet[2189]: I0412 21:29:59.517678 2189 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 21:29:59.517755 kubelet[2189]: I0412 21:29:59.517744 2189 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 21:29:59.517789 kubelet[2189]: E0412 21:29:59.517732 2189 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-97ccf21113.17c5a5ade19f360d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-97ccf21113", UID:"ci-3510.3.3-a-97ccf21113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-97ccf21113"}, FirstTimestamp:time.Date(2024, time.April, 12, 21, 29, 59, 517574669, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 21, 29, 59, 517574669, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.89.153:6443/api/v1/namespaces/default/events": dial tcp 139.178.89.153:6443: connect: connection refused'(may retry after sleeping) Apr 12 21:29:59.517839 kubelet[2189]: E0412 21:29:59.517790 2189 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 21:29:59.517839 kubelet[2189]: E0412 21:29:59.517801 2189 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 21:29:59.518000 audit[2189]: AVC avc: denied { mac_admin } for pid=2189 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:59.518000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:29:59.518000 audit[2189]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001106c60 a1=c00112e738 a2=c001106c30 a3=25 items=0 ppid=1 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.518000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:29:59.518000 audit[2189]: AVC avc: denied { mac_admin } for pid=2189 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:59.518000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:29:59.518000 audit[2189]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00140e000 a1=c000a8c018 a2=c000af8060 a3=25 items=0 ppid=1 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.518000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:29:59.518863 kubelet[2189]: I0412 21:29:59.518638 2189 server.go:461] "Adding debug handlers to kubelet server" Apr 12 21:29:59.518863 kubelet[2189]: I0412 21:29:59.518688 2189 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 21:29:59.518863 kubelet[2189]: I0412 21:29:59.518739 2189 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 21:29:59.518954 kubelet[2189]: I0412 21:29:59.518946 2189 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 21:29:59.519034 kubelet[2189]: I0412 21:29:59.519022 2189 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 21:29:59.519082 kubelet[2189]: I0412 21:29:59.519047 2189 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 21:29:59.519181 kubelet[2189]: E0412 21:29:59.519162 2189 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.153:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-97ccf21113?timeout=10s\": dial tcp 139.178.89.153:6443: connect: connection refused" interval="200ms" Apr 12 21:29:59.519266 kubelet[2189]: W0412 21:29:59.519242 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.89.153:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.519309 kubelet[2189]: E0412 21:29:59.519276 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.89.153:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.520000 audit[2213]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.520000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe872da400 a2=0 a3=7ffe872da3ec items=0 ppid=2189 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 21:29:59.520000 audit[2214]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.520000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3a77f2c0 a2=0 a3=7ffd3a77f2ac items=0 ppid=2189 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 21:29:59.521000 audit[2216]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.521000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8dbf0350 a2=0 a3=7ffe8dbf033c items=0 ppid=2189 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:29:59.522000 audit[2218]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.522000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9a43e8e0 a2=0 a3=7fff9a43e8cc items=0 ppid=2189 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:29:59.526000 audit[2221]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.526000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff180c63c0 a2=0 a3=7fff180c63ac items=0 ppid=2189 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 21:29:59.527117 kubelet[2189]: I0412 21:29:59.527098 2189 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 21:29:59.527000 audit[2222]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:29:59.527000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff145ddbe0 a2=0 a3=7fff145ddbcc items=0 ppid=2189 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 21:29:59.527594 kubelet[2189]: I0412 21:29:59.527587 2189 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 21:29:59.527000 audit[2224]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.527000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3233c600 a2=0 a3=7ffe3233c5ec items=0 ppid=2189 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 21:29:59.527757 kubelet[2189]: I0412 21:29:59.527605 2189 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 21:29:59.527757 kubelet[2189]: I0412 21:29:59.527624 2189 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 21:29:59.527757 kubelet[2189]: E0412 21:29:59.527658 2189 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 21:29:59.527904 kubelet[2189]: W0412 21:29:59.527891 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.89.153:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.527939 kubelet[2189]: E0412 21:29:59.527912 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.89.153:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:29:59.527000 audit[2225]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:29:59.527000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec1ba1480 a2=0 a3=7ffec1ba146c items=0 ppid=2189 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 21:29:59.527000 audit[2226]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.527000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd68e5b60 a2=0 a3=7fffd68e5b4c items=0 ppid=2189 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 21:29:59.528000 audit[2227]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:29:59.528000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc543cb3d0 a2=0 a3=7ffc543cb3bc items=0 ppid=2189 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 21:29:59.528000 audit[2228]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:29:59.528000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddea96fa0 a2=0 a3=7ffddea96f8c items=0 ppid=2189 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 21:29:59.528000 audit[2229]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:29:59.528000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe635f9b00 a2=0 a3=7ffe635f9aec items=0 ppid=2189 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 21:29:59.577268 kubelet[2189]: I0412 21:29:59.577194 2189 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 21:29:59.577268 kubelet[2189]: I0412 21:29:59.577231 2189 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 21:29:59.577527 kubelet[2189]: I0412 21:29:59.577293 2189 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:29:59.585198 kubelet[2189]: I0412 21:29:59.585128 2189 policy_none.go:49] "None policy: Start" Apr 12 21:29:59.586430 kubelet[2189]: I0412 21:29:59.586347 2189 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 21:29:59.586430 kubelet[2189]: I0412 21:29:59.586403 2189 state_mem.go:35] "Initializing new in-memory state store" Apr 12 21:29:59.595851 systemd[1]: Created slice kubepods.slice. Apr 12 21:29:59.604951 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 21:29:59.611622 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 21:29:59.625086 kubelet[2189]: I0412 21:29:59.625036 2189 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.626418 kubelet[2189]: I0412 21:29:59.626332 2189 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 21:29:59.625000 audit[2189]: AVC avc: denied { mac_admin } for pid=2189 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:29:59.625000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:29:59.625000 audit[2189]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000822120 a1=c00061a060 a2=c0008220f0 a3=25 items=0 ppid=1 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:29:59.625000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:29:59.627208 kubelet[2189]: I0412 21:29:59.626491 2189 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 21:29:59.627208 kubelet[2189]: E0412 21:29:59.626866 2189 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.153:6443/api/v1/nodes\": dial tcp 139.178.89.153:6443: connect: connection refused" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.627208 kubelet[2189]: I0412 21:29:59.626982 2189 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 21:29:59.627845 kubelet[2189]: E0412 21:29:59.627795 2189 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-97ccf21113\" not found" Apr 12 21:29:59.627845 kubelet[2189]: I0412 21:29:59.627833 2189 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:29:59.631460 kubelet[2189]: I0412 21:29:59.631413 2189 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:29:59.635607 kubelet[2189]: I0412 21:29:59.635526 2189 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:29:59.648661 systemd[1]: Created slice kubepods-burstable-podec85b86151f3e5b3c724d74f3804ff3f.slice. Apr 12 21:29:59.675147 systemd[1]: Created slice kubepods-burstable-pode8cd4e091927a344fc8f277956b0f5bf.slice. Apr 12 21:29:59.695900 systemd[1]: Created slice kubepods-burstable-pod96025fdc9b75a8203c99c35e284fc131.slice. Apr 12 21:29:59.720301 kubelet[2189]: E0412 21:29:59.720221 2189 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.153:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-97ccf21113?timeout=10s\": dial tcp 139.178.89.153:6443: connect: connection refused" interval="400ms" Apr 12 21:29:59.721429 kubelet[2189]: I0412 21:29:59.721331 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ec85b86151f3e5b3c724d74f3804ff3f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-97ccf21113\" (UID: \"ec85b86151f3e5b3c724d74f3804ff3f\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.721658 kubelet[2189]: I0412 21:29:59.721472 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.721658 kubelet[2189]: I0412 21:29:59.721641 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.721856 kubelet[2189]: I0412 21:29:59.721728 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ec85b86151f3e5b3c724d74f3804ff3f-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-97ccf21113\" (UID: \"ec85b86151f3e5b3c724d74f3804ff3f\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.721856 kubelet[2189]: I0412 21:29:59.721800 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ec85b86151f3e5b3c724d74f3804ff3f-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-97ccf21113\" (UID: \"ec85b86151f3e5b3c724d74f3804ff3f\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.722056 kubelet[2189]: I0412 21:29:59.721899 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.722056 kubelet[2189]: I0412 21:29:59.721986 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/96025fdc9b75a8203c99c35e284fc131-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-97ccf21113\" (UID: \"96025fdc9b75a8203c99c35e284fc131\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.722230 kubelet[2189]: I0412 21:29:59.722061 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.722230 kubelet[2189]: I0412 21:29:59.722141 2189 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.831312 kubelet[2189]: I0412 21:29:59.831118 2189 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.831874 kubelet[2189]: E0412 21:29:59.831829 2189 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.153:6443/api/v1/nodes\": dial tcp 139.178.89.153:6443: connect: connection refused" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:29:59.972795 env[1471]: time="2024-04-12T21:29:59.972663374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-97ccf21113,Uid:ec85b86151f3e5b3c724d74f3804ff3f,Namespace:kube-system,Attempt:0,}" Apr 12 21:29:59.993519 env[1471]: time="2024-04-12T21:29:59.993392440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-97ccf21113,Uid:e8cd4e091927a344fc8f277956b0f5bf,Namespace:kube-system,Attempt:0,}" Apr 12 21:30:00.000903 env[1471]: time="2024-04-12T21:30:00.000791260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-97ccf21113,Uid:96025fdc9b75a8203c99c35e284fc131,Namespace:kube-system,Attempt:0,}" Apr 12 21:30:00.121377 kubelet[2189]: E0412 21:30:00.121113 2189 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.153:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-97ccf21113?timeout=10s\": dial tcp 139.178.89.153:6443: connect: connection refused" interval="800ms" Apr 12 21:30:00.235839 kubelet[2189]: I0412 21:30:00.235757 2189 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:00.236520 kubelet[2189]: E0412 21:30:00.236435 2189 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.153:6443/api/v1/nodes\": dial tcp 139.178.89.153:6443: connect: connection refused" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:00.437757 kubelet[2189]: W0412 21:30:00.437614 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.89.153:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.437757 kubelet[2189]: E0412 21:30:00.437736 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.89.153:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.492943 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2721871765.mount: Deactivated successfully. Apr 12 21:30:00.494127 env[1471]: time="2024-04-12T21:30:00.494080141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.494747 env[1471]: time="2024-04-12T21:30:00.494707083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.495370 env[1471]: time="2024-04-12T21:30:00.495329164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.496288 env[1471]: time="2024-04-12T21:30:00.496239031Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.496943 env[1471]: time="2024-04-12T21:30:00.496903006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.497340 env[1471]: time="2024-04-12T21:30:00.497306019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.499026 env[1471]: time="2024-04-12T21:30:00.498987638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.501349 env[1471]: time="2024-04-12T21:30:00.501292482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.502564 env[1471]: time="2024-04-12T21:30:00.502524354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.502922 env[1471]: time="2024-04-12T21:30:00.502906191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.503358 env[1471]: time="2024-04-12T21:30:00.503346209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.503896 env[1471]: time="2024-04-12T21:30:00.503884081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:00.507075 kubelet[2189]: W0412 21:30:00.507036 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.89.153:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-97ccf21113&limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.507123 kubelet[2189]: E0412 21:30:00.507090 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.89.153:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-97ccf21113&limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.508069 env[1471]: time="2024-04-12T21:30:00.508039681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:00.508069 env[1471]: time="2024-04-12T21:30:00.508060877Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:00.508143 env[1471]: time="2024-04-12T21:30:00.508067672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:00.508181 env[1471]: time="2024-04-12T21:30:00.508136733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35e1db660114f095b0960051e5f6f5392a4aabcd4c9de32e6fd99c74576eb502 pid=2240 runtime=io.containerd.runc.v2 Apr 12 21:30:00.509850 env[1471]: time="2024-04-12T21:30:00.509819799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:00.509850 env[1471]: time="2024-04-12T21:30:00.509840821Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:00.509850 env[1471]: time="2024-04-12T21:30:00.509847913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:00.509964 env[1471]: time="2024-04-12T21:30:00.509909980Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bec69c853264f3e782a3727713fdf5ffbbaff1f43378935b20f4c8d9f1650304 pid=2259 runtime=io.containerd.runc.v2 Apr 12 21:30:00.510301 env[1471]: time="2024-04-12T21:30:00.510278116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:00.510301 env[1471]: time="2024-04-12T21:30:00.510296219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:00.510354 env[1471]: time="2024-04-12T21:30:00.510302590Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:00.510379 env[1471]: time="2024-04-12T21:30:00.510359999Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05dc046c2397d97d0811d161bd9b2eb9846de767bf47104d5319a8b7ef3b7762 pid=2269 runtime=io.containerd.runc.v2 Apr 12 21:30:00.514442 systemd[1]: Started cri-containerd-35e1db660114f095b0960051e5f6f5392a4aabcd4c9de32e6fd99c74576eb502.scope. Apr 12 21:30:00.517079 systemd[1]: Started cri-containerd-05dc046c2397d97d0811d161bd9b2eb9846de767bf47104d5319a8b7ef3b7762.scope. Apr 12 21:30:00.517899 systemd[1]: Started cri-containerd-bec69c853264f3e782a3727713fdf5ffbbaff1f43378935b20f4c8d9f1650304.scope. Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.547950 kernel: kauditd_printk_skb: 217 callbacks suppressed Apr 12 21:30:00.547997 kernel: audit: type=1400 audit(1712957400.521:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.629639 kubelet[2189]: W0412 21:30:00.629611 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.89.153:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.629690 kubelet[2189]: E0412 21:30:00.629650 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.89.153:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.673665 kernel: audit: type=1400 audit(1712957400.521:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.673703 kernel: audit: type=1400 audit(1712957400.521:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.686058 kubelet[2189]: W0412 21:30:00.686009 2189 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.89.153:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.686058 kubelet[2189]: E0412 21:30:00.686031 2189 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.89.153:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.153:6443: connect: connection refused Apr 12 21:30:00.736823 kernel: audit: type=1400 audit(1712957400.521:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.800565 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:30:00.800600 kernel: audit: type=1400 audit(1712957400.521:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.827449 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 21:30:00.827485 kernel: audit: backlog limit exceeded Apr 12 21:30:00.827504 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:30:00.870036 kubelet[2189]: E0412 21:30:00.869967 2189 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-97ccf21113.17c5a5ade19f360d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-97ccf21113", UID:"ci-3510.3.3-a-97ccf21113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-97ccf21113"}, FirstTimestamp:time.Date(2024, time.April, 12, 21, 29, 59, 517574669, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 21, 29, 59, 517574669, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.89.153:6443/api/v1/namespaces/default/events": dial tcp 139.178.89.153:6443: connect: connection refused'(may retry after sleeping) Apr 12 21:30:00.890765 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit: BPF prog-id=61 op=LOAD Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2240 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653164623636303131346630393562303936303035316535663666 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2240 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653164623636303131346630393562303936303035316535663666 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.610000 audit: BPF prog-id=62 op=LOAD Apr 12 21:30:00.736000 audit: BPF prog-id=63 op=LOAD Apr 12 21:30:00.610000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002c1dc0 items=0 ppid=2240 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653164623636303131346630393562303936303035316535663666 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633639633835333236346633653738326133373237373133666466 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633639633835333236346633653738326133373237373133666466 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit: BPF prog-id=65 op=LOAD Apr 12 21:30:00.736000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0003f00a0 items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633639633835333236346633653738326133373237373133666466 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.922321 kubelet[2189]: E0412 21:30:00.922279 2189 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.153:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-97ccf21113?timeout=10s\": dial tcp 139.178.89.153:6443: connect: connection refused" interval="1.6s" Apr 12 21:30:00.889000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.889000 audit: BPF prog-id=66 op=LOAD Apr 12 21:30:00.889000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003f00e8 items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633639633835333236346633653738326133373237373133666466 Apr 12 21:30:00.968000 audit: BPF prog-id=66 op=UNLOAD Apr 12 21:30:00.968000 audit: BPF prog-id=65 op=UNLOAD Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit: BPF prog-id=67 op=LOAD Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035646330343663323339376439376430383131643136316264396232 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035646330343663323339376439376430383131643136316264396232 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.736000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002c1e08 items=0 ppid=2240 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653164623636303131346630393562303936303035316535663666 Apr 12 21:30:00.993000 audit: BPF prog-id=64 op=UNLOAD Apr 12 21:30:00.993000 audit: BPF prog-id=62 op=UNLOAD Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit: BPF prog-id=68 op=LOAD Apr 12 21:30:00.968000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003f04f8 items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633639633835333236346633653738326133373237373133666466 Apr 12 21:30:00.968000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.968000 audit: BPF prog-id=69 op=LOAD Apr 12 21:30:00.968000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001ebac0 items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035646330343663323339376439376430383131643136316264396232 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit: BPF prog-id=70 op=LOAD Apr 12 21:30:00.993000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.993000 audit: BPF prog-id=71 op=LOAD Apr 12 21:30:00.993000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b6218 items=0 ppid=2240 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.994000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001ebb08 items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335653164623636303131346630393562303936303035316535663666 Apr 12 21:30:00.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035646330343663323339376439376430383131643136316264396232 Apr 12 21:30:00.994000 audit: BPF prog-id=70 op=UNLOAD Apr 12 21:30:00.994000 audit: BPF prog-id=69 op=UNLOAD Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:00.994000 audit: BPF prog-id=72 op=LOAD Apr 12 21:30:00.994000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001ebf18 items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:00.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035646330343663323339376439376430383131643136316264396232 Apr 12 21:30:01.011074 env[1471]: time="2024-04-12T21:30:01.011047887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-97ccf21113,Uid:96025fdc9b75a8203c99c35e284fc131,Namespace:kube-system,Attempt:0,} returns sandbox id \"35e1db660114f095b0960051e5f6f5392a4aabcd4c9de32e6fd99c74576eb502\"" Apr 12 21:30:01.011331 env[1471]: time="2024-04-12T21:30:01.011148239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-97ccf21113,Uid:ec85b86151f3e5b3c724d74f3804ff3f,Namespace:kube-system,Attempt:0,} returns sandbox id \"bec69c853264f3e782a3727713fdf5ffbbaff1f43378935b20f4c8d9f1650304\"" Apr 12 21:30:01.012013 env[1471]: time="2024-04-12T21:30:01.011997481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-97ccf21113,Uid:e8cd4e091927a344fc8f277956b0f5bf,Namespace:kube-system,Attempt:0,} returns sandbox id \"05dc046c2397d97d0811d161bd9b2eb9846de767bf47104d5319a8b7ef3b7762\"" Apr 12 21:30:01.012857 env[1471]: time="2024-04-12T21:30:01.012845672Z" level=info msg="CreateContainer within sandbox \"35e1db660114f095b0960051e5f6f5392a4aabcd4c9de32e6fd99c74576eb502\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 21:30:01.012902 env[1471]: time="2024-04-12T21:30:01.012889883Z" level=info msg="CreateContainer within sandbox \"bec69c853264f3e782a3727713fdf5ffbbaff1f43378935b20f4c8d9f1650304\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 21:30:01.012974 env[1471]: time="2024-04-12T21:30:01.012960404Z" level=info msg="CreateContainer within sandbox \"05dc046c2397d97d0811d161bd9b2eb9846de767bf47104d5319a8b7ef3b7762\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 21:30:01.019539 env[1471]: time="2024-04-12T21:30:01.019498975Z" level=info msg="CreateContainer within sandbox \"bec69c853264f3e782a3727713fdf5ffbbaff1f43378935b20f4c8d9f1650304\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b26f503952e517e9671ffd4f182c39dbffa2d814e06c63d9208351fb2df4b2ac\"" Apr 12 21:30:01.019762 env[1471]: time="2024-04-12T21:30:01.019750508Z" level=info msg="StartContainer for \"b26f503952e517e9671ffd4f182c39dbffa2d814e06c63d9208351fb2df4b2ac\"" Apr 12 21:30:01.020567 env[1471]: time="2024-04-12T21:30:01.020550319Z" level=info msg="CreateContainer within sandbox \"35e1db660114f095b0960051e5f6f5392a4aabcd4c9de32e6fd99c74576eb502\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f747e533d8c26066fd031f1a7433cad9bf33d79405b537da1f133ca930f5cdd5\"" Apr 12 21:30:01.020784 env[1471]: time="2024-04-12T21:30:01.020748727Z" level=info msg="StartContainer for \"f747e533d8c26066fd031f1a7433cad9bf33d79405b537da1f133ca930f5cdd5\"" Apr 12 21:30:01.021627 env[1471]: time="2024-04-12T21:30:01.021601951Z" level=info msg="CreateContainer within sandbox \"05dc046c2397d97d0811d161bd9b2eb9846de767bf47104d5319a8b7ef3b7762\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"84bb91f48230bcf9ea8177583566611c69db46ea7c9e8cd287a44e2902ac1f9a\"" Apr 12 21:30:01.021778 env[1471]: time="2024-04-12T21:30:01.021764144Z" level=info msg="StartContainer for \"84bb91f48230bcf9ea8177583566611c69db46ea7c9e8cd287a44e2902ac1f9a\"" Apr 12 21:30:01.027877 systemd[1]: Started cri-containerd-b26f503952e517e9671ffd4f182c39dbffa2d814e06c63d9208351fb2df4b2ac.scope. Apr 12 21:30:01.028585 systemd[1]: Started cri-containerd-f747e533d8c26066fd031f1a7433cad9bf33d79405b537da1f133ca930f5cdd5.scope. Apr 12 21:30:01.030336 systemd[1]: Started cri-containerd-84bb91f48230bcf9ea8177583566611c69db46ea7c9e8cd287a44e2902ac1f9a.scope. Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.033000 audit: BPF prog-id=73 op=LOAD Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2240 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637343765353333643863323630363666643033316631613734333363 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2240 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637343765353333643863323630363666643033316631613734333363 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=74 op=LOAD Apr 12 21:30:01.034000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000096db0 items=0 ppid=2240 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637343765353333643863323630363666643033316631613734333363 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=75 op=LOAD Apr 12 21:30:01.034000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000096df8 items=0 ppid=2240 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637343765353333643863323630363666643033316631613734333363 Apr 12 21:30:01.034000 audit: BPF prog-id=75 op=UNLOAD Apr 12 21:30:01.034000 audit: BPF prog-id=74 op=UNLOAD Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=76 op=LOAD Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=77 op=LOAD Apr 12 21:30:01.034000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000097208 items=0 ppid=2240 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637343765353333643863323630363666643033316631613734333363 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2259 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232366635303339353265353137653936373166666434663138326333 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2259 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232366635303339353265353137653936373166666434663138326333 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=78 op=LOAD Apr 12 21:30:01.034000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000261c40 items=0 ppid=2259 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232366635303339353265353137653936373166666434663138326333 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=79 op=LOAD Apr 12 21:30:01.034000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000261c88 items=0 ppid=2259 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232366635303339353265353137653936373166666434663138326333 Apr 12 21:30:01.034000 audit: BPF prog-id=79 op=UNLOAD Apr 12 21:30:01.034000 audit: BPF prog-id=78 op=UNLOAD Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.034000 audit: BPF prog-id=80 op=LOAD Apr 12 21:30:01.034000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003cc098 items=0 ppid=2259 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232366635303339353265353137653936373166666434663138326333 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit: BPF prog-id=81 op=LOAD Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2269 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834626239316634383233306263663965613831373735383335363636 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2269 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834626239316634383233306263663965613831373735383335363636 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit: BPF prog-id=82 op=LOAD Apr 12 21:30:01.036000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002f8700 items=0 ppid=2269 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834626239316634383233306263663965613831373735383335363636 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit: BPF prog-id=83 op=LOAD Apr 12 21:30:01.036000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002f8748 items=0 ppid=2269 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834626239316634383233306263663965613831373735383335363636 Apr 12 21:30:01.036000 audit: BPF prog-id=83 op=UNLOAD Apr 12 21:30:01.036000 audit: BPF prog-id=82 op=UNLOAD Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:01.036000 audit: BPF prog-id=84 op=LOAD Apr 12 21:30:01.036000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002f8b58 items=0 ppid=2269 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834626239316634383233306263663965613831373735383335363636 Apr 12 21:30:01.039068 kubelet[2189]: I0412 21:30:01.037802 2189 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:01.039068 kubelet[2189]: E0412 21:30:01.037978 2189 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.153:6443/api/v1/nodes\": dial tcp 139.178.89.153:6443: connect: connection refused" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:01.053189 env[1471]: time="2024-04-12T21:30:01.053155896Z" level=info msg="StartContainer for \"b26f503952e517e9671ffd4f182c39dbffa2d814e06c63d9208351fb2df4b2ac\" returns successfully" Apr 12 21:30:01.054351 env[1471]: time="2024-04-12T21:30:01.054336536Z" level=info msg="StartContainer for \"84bb91f48230bcf9ea8177583566611c69db46ea7c9e8cd287a44e2902ac1f9a\" returns successfully" Apr 12 21:30:01.055611 env[1471]: time="2024-04-12T21:30:01.055588678Z" level=info msg="StartContainer for \"f747e533d8c26066fd031f1a7433cad9bf33d79405b537da1f133ca930f5cdd5\" returns successfully" Apr 12 21:30:01.756000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:01.756000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:01.756000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c00a232000 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:30:01.756000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c008980020 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:30:01.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:30:01.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:30:01.756000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:01.756000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c00a2b2000 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:30:01.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:30:01.770000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:01.770000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:01.770000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c00a1f0870 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:30:01.770000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c00090d720 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:30:01.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:30:01.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:30:01.770000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:01.770000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00a744120 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:30:01.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:30:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000157830 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005002a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:02.125985 kubelet[2189]: E0412 21:30:02.125925 2189 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.3-a-97ccf21113" not found Apr 12 21:30:02.501080 kubelet[2189]: E0412 21:30:02.500986 2189 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.3-a-97ccf21113" not found Apr 12 21:30:02.530734 kubelet[2189]: E0412 21:30:02.530640 2189 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.3-a-97ccf21113\" not found" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:02.642110 kubelet[2189]: I0412 21:30:02.642022 2189 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:02.649474 kubelet[2189]: I0412 21:30:02.649394 2189 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:02.666817 kubelet[2189]: E0412 21:30:02.666728 2189 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-97ccf21113\" not found" Apr 12 21:30:02.768078 kubelet[2189]: E0412 21:30:02.767870 2189 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-97ccf21113\" not found" Apr 12 21:30:02.868675 kubelet[2189]: E0412 21:30:02.868619 2189 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-97ccf21113\" not found" Apr 12 21:30:03.518888 kubelet[2189]: I0412 21:30:03.518805 2189 apiserver.go:52] "Watching apiserver" Apr 12 21:30:03.620268 kubelet[2189]: I0412 21:30:03.620165 2189 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 21:30:03.646914 kubelet[2189]: I0412 21:30:03.646798 2189 reconciler.go:41] "Reconciler: start to sync state" Apr 12 21:30:04.098169 kubelet[2189]: W0412 21:30:04.098112 2189 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:30:05.077888 systemd[1]: Reloading. Apr 12 21:30:05.124874 /usr/lib/systemd/system-generators/torcx-generator[2528]: time="2024-04-12T21:30:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:30:05.124889 /usr/lib/systemd/system-generators/torcx-generator[2528]: time="2024-04-12T21:30:05Z" level=info msg="torcx already run" Apr 12 21:30:05.183197 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:30:05.183207 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:30:05.197425 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit: BPF prog-id=85 op=LOAD Apr 12 21:30:05.247000 audit: BPF prog-id=46 op=UNLOAD Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit: BPF prog-id=86 op=LOAD Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.247000 audit: BPF prog-id=87 op=LOAD Apr 12 21:30:05.247000 audit: BPF prog-id=47 op=UNLOAD Apr 12 21:30:05.247000 audit: BPF prog-id=48 op=UNLOAD Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.248000 audit: BPF prog-id=88 op=LOAD Apr 12 21:30:05.248000 audit: BPF prog-id=73 op=UNLOAD Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.249000 audit: BPF prog-id=89 op=LOAD Apr 12 21:30:05.249000 audit: BPF prog-id=49 op=UNLOAD Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit: BPF prog-id=90 op=LOAD Apr 12 21:30:05.250000 audit: BPF prog-id=63 op=UNLOAD Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit: BPF prog-id=91 op=LOAD Apr 12 21:30:05.250000 audit: BPF prog-id=50 op=UNLOAD Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit: BPF prog-id=92 op=LOAD Apr 12 21:30:05.251000 audit: BPF prog-id=51 op=UNLOAD Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit: BPF prog-id=93 op=LOAD Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit: BPF prog-id=94 op=LOAD Apr 12 21:30:05.251000 audit: BPF prog-id=52 op=UNLOAD Apr 12 21:30:05.251000 audit: BPF prog-id=53 op=UNLOAD Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.251000 audit: BPF prog-id=95 op=LOAD Apr 12 21:30:05.251000 audit: BPF prog-id=76 op=UNLOAD Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit: BPF prog-id=96 op=LOAD Apr 12 21:30:05.252000 audit: BPF prog-id=61 op=UNLOAD Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.252000 audit: BPF prog-id=97 op=LOAD Apr 12 21:30:05.252000 audit: BPF prog-id=54 op=UNLOAD Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit: BPF prog-id=98 op=LOAD Apr 12 21:30:05.253000 audit: BPF prog-id=55 op=UNLOAD Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit: BPF prog-id=99 op=LOAD Apr 12 21:30:05.253000 audit: BPF prog-id=67 op=UNLOAD Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit: BPF prog-id=100 op=LOAD Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.253000 audit: BPF prog-id=101 op=LOAD Apr 12 21:30:05.253000 audit: BPF prog-id=56 op=UNLOAD Apr 12 21:30:05.253000 audit: BPF prog-id=57 op=UNLOAD Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit: BPF prog-id=102 op=LOAD Apr 12 21:30:05.254000 audit: BPF prog-id=58 op=UNLOAD Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit: BPF prog-id=103 op=LOAD Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.254000 audit: BPF prog-id=104 op=LOAD Apr 12 21:30:05.254000 audit: BPF prog-id=59 op=UNLOAD Apr 12 21:30:05.254000 audit: BPF prog-id=60 op=UNLOAD Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.255000 audit: BPF prog-id=105 op=LOAD Apr 12 21:30:05.255000 audit: BPF prog-id=81 op=UNLOAD Apr 12 21:30:05.262017 kubelet[2189]: I0412 21:30:05.261999 2189 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 21:30:05.262079 systemd[1]: Stopping kubelet.service... Apr 12 21:30:05.285986 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 21:30:05.286460 systemd[1]: Stopped kubelet.service. Apr 12 21:30:05.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:30:05.290392 systemd[1]: Started kubelet.service. Apr 12 21:30:05.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:30:05.366596 kubelet[2586]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:30:05.366596 kubelet[2586]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 21:30:05.366596 kubelet[2586]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:30:05.366867 kubelet[2586]: I0412 21:30:05.366609 2586 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 21:30:05.369814 kubelet[2586]: I0412 21:30:05.369776 2586 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 21:30:05.369814 kubelet[2586]: I0412 21:30:05.369791 2586 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 21:30:05.369957 kubelet[2586]: I0412 21:30:05.369920 2586 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 21:30:05.371117 kubelet[2586]: I0412 21:30:05.371076 2586 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 21:30:05.371838 kubelet[2586]: I0412 21:30:05.371826 2586 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 21:30:05.389241 kubelet[2586]: I0412 21:30:05.389190 2586 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 21:30:05.389344 kubelet[2586]: I0412 21:30:05.389307 2586 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 21:30:05.389385 kubelet[2586]: I0412 21:30:05.389348 2586 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 21:30:05.389385 kubelet[2586]: I0412 21:30:05.389359 2586 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 21:30:05.389385 kubelet[2586]: I0412 21:30:05.389366 2586 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 21:30:05.389385 kubelet[2586]: I0412 21:30:05.389383 2586 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:30:05.390794 kubelet[2586]: I0412 21:30:05.390785 2586 kubelet.go:405] "Attempting to sync node with API server" Apr 12 21:30:05.390832 kubelet[2586]: I0412 21:30:05.390797 2586 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 21:30:05.390832 kubelet[2586]: I0412 21:30:05.390808 2586 kubelet.go:309] "Adding apiserver pod source" Apr 12 21:30:05.390832 kubelet[2586]: I0412 21:30:05.390815 2586 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 21:30:05.391106 kubelet[2586]: I0412 21:30:05.391092 2586 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 21:30:05.392170 kubelet[2586]: I0412 21:30:05.392159 2586 server.go:1168] "Started kubelet" Apr 12 21:30:05.392223 kubelet[2586]: I0412 21:30:05.392203 2586 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 21:30:05.392259 kubelet[2586]: I0412 21:30:05.392231 2586 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 21:30:05.392484 kubelet[2586]: E0412 21:30:05.392473 2586 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 21:30:05.392529 kubelet[2586]: E0412 21:30:05.392490 2586 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 21:30:05.392842 kubelet[2586]: I0412 21:30:05.392834 2586 server.go:461] "Adding debug handlers to kubelet server" Apr 12 21:30:05.391000 audit[2586]: AVC avc: denied { mac_admin } for pid=2586 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.391000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:30:05.391000 audit[2586]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb5c80 a1=c000bfe660 a2=c000bb5c50 a3=25 items=0 ppid=1 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:05.391000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:30:05.391000 audit[2586]: AVC avc: denied { mac_admin } for pid=2586 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.391000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:30:05.391000 audit[2586]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007922e0 a1=c000bfe678 a2=c000bb5d10 a3=25 items=0 ppid=1 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:05.391000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:30:05.393169 kubelet[2586]: I0412 21:30:05.392924 2586 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 21:30:05.393169 kubelet[2586]: I0412 21:30:05.392948 2586 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 21:30:05.393169 kubelet[2586]: I0412 21:30:05.392964 2586 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 21:30:05.393169 kubelet[2586]: I0412 21:30:05.393033 2586 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 21:30:05.393169 kubelet[2586]: E0412 21:30:05.393052 2586 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-97ccf21113\" not found" Apr 12 21:30:05.393169 kubelet[2586]: I0412 21:30:05.393070 2586 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 21:30:05.397183 kubelet[2586]: I0412 21:30:05.397165 2586 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 21:30:05.399256 kubelet[2586]: I0412 21:30:05.399231 2586 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 21:30:05.399256 kubelet[2586]: I0412 21:30:05.399259 2586 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 21:30:05.399349 kubelet[2586]: I0412 21:30:05.399271 2586 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 21:30:05.399349 kubelet[2586]: E0412 21:30:05.399308 2586 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 21:30:05.414568 kubelet[2586]: I0412 21:30:05.414552 2586 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 21:30:05.414568 kubelet[2586]: I0412 21:30:05.414565 2586 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 21:30:05.414568 kubelet[2586]: I0412 21:30:05.414574 2586 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:30:05.414698 kubelet[2586]: I0412 21:30:05.414660 2586 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 21:30:05.414698 kubelet[2586]: I0412 21:30:05.414668 2586 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Apr 12 21:30:05.414698 kubelet[2586]: I0412 21:30:05.414672 2586 policy_none.go:49] "None policy: Start" Apr 12 21:30:05.415025 kubelet[2586]: I0412 21:30:05.414989 2586 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 21:30:05.415025 kubelet[2586]: I0412 21:30:05.415002 2586 state_mem.go:35] "Initializing new in-memory state store" Apr 12 21:30:05.415091 kubelet[2586]: I0412 21:30:05.415085 2586 state_mem.go:75] "Updated machine memory state" Apr 12 21:30:05.415000 audit[2586]: AVC avc: denied { mac_admin } for pid=2586 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:05.415000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:30:05.415000 audit[2586]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00065ef90 a1=c000fad158 a2=c00065ef60 a3=25 items=0 ppid=1 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:05.415000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:30:05.417316 kubelet[2586]: I0412 21:30:05.417123 2586 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 21:30:05.417316 kubelet[2586]: I0412 21:30:05.417157 2586 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 21:30:05.417316 kubelet[2586]: I0412 21:30:05.417278 2586 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 21:30:05.496795 kubelet[2586]: I0412 21:30:05.496739 2586 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.499693 kubelet[2586]: I0412 21:30:05.499677 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:05.499770 kubelet[2586]: I0412 21:30:05.499740 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:05.499770 kubelet[2586]: I0412 21:30:05.499769 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:05.502871 kubelet[2586]: W0412 21:30:05.502854 2586 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:30:05.503849 kubelet[2586]: W0412 21:30:05.503834 2586 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:30:05.504128 kubelet[2586]: I0412 21:30:05.504115 2586 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.504192 kubelet[2586]: I0412 21:30:05.504167 2586 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.504419 kubelet[2586]: W0412 21:30:05.504407 2586 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:30:05.504465 kubelet[2586]: E0412 21:30:05.504448 2586 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-97ccf21113\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699551 kubelet[2586]: I0412 21:30:05.698968 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699551 kubelet[2586]: I0412 21:30:05.699012 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699551 kubelet[2586]: I0412 21:30:05.699036 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ec85b86151f3e5b3c724d74f3804ff3f-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-97ccf21113\" (UID: \"ec85b86151f3e5b3c724d74f3804ff3f\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699551 kubelet[2586]: I0412 21:30:05.699056 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ec85b86151f3e5b3c724d74f3804ff3f-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-97ccf21113\" (UID: \"ec85b86151f3e5b3c724d74f3804ff3f\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699551 kubelet[2586]: I0412 21:30:05.699081 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ec85b86151f3e5b3c724d74f3804ff3f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-97ccf21113\" (UID: \"ec85b86151f3e5b3c724d74f3804ff3f\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699753 kubelet[2586]: I0412 21:30:05.699100 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699753 kubelet[2586]: I0412 21:30:05.699119 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699753 kubelet[2586]: I0412 21:30:05.699141 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e8cd4e091927a344fc8f277956b0f5bf-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-97ccf21113\" (UID: \"e8cd4e091927a344fc8f277956b0f5bf\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:05.699753 kubelet[2586]: I0412 21:30:05.699165 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/96025fdc9b75a8203c99c35e284fc131-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-97ccf21113\" (UID: \"96025fdc9b75a8203c99c35e284fc131\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:06.096000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524856 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 21:30:06.121972 kernel: kauditd_printk_skb: 620 callbacks suppressed Apr 12 21:30:06.122039 kernel: audit: type=1400 audit(1712957406.096:934): avc: denied { watch } for pid=2418 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524856 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 21:30:06.096000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba0300 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:06.210272 kernel: audit: type=1300 audit(1712957406.096:934): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba0300 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:06.096000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:06.391356 kubelet[2586]: I0412 21:30:06.391258 2586 apiserver.go:52] "Watching apiserver" Apr 12 21:30:06.393834 kubelet[2586]: I0412 21:30:06.393824 2586 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 21:30:06.402717 kubelet[2586]: I0412 21:30:06.402675 2586 reconciler.go:41] "Reconciler: start to sync state" Apr 12 21:30:06.406058 kubelet[2586]: W0412 21:30:06.406049 2586 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:30:06.406105 kubelet[2586]: E0412 21:30:06.406078 2586 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-97ccf21113\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-97ccf21113" Apr 12 21:30:06.411641 kernel: audit: type=1327 audit(1712957406.096:934): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:06.414971 kubelet[2586]: I0412 21:30:06.414956 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-97ccf21113" podStartSLOduration=1.414928238 podCreationTimestamp="2024-04-12 21:30:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:30:06.414868655 +0000 UTC m=+1.117345604" watchObservedRunningTime="2024-04-12 21:30:06.414928238 +0000 UTC m=+1.117405185" Apr 12 21:30:06.418820 kubelet[2586]: I0412 21:30:06.418770 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-97ccf21113" podStartSLOduration=2.418745635 podCreationTimestamp="2024-04-12 21:30:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:30:06.418522888 +0000 UTC m=+1.120999835" watchObservedRunningTime="2024-04-12 21:30:06.418745635 +0000 UTC m=+1.121222581" Apr 12 21:30:06.422721 kubelet[2586]: I0412 21:30:06.422709 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-97ccf21113" podStartSLOduration=1.422690234 podCreationTimestamp="2024-04-12 21:30:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:30:06.422593503 +0000 UTC m=+1.125070450" watchObservedRunningTime="2024-04-12 21:30:06.422690234 +0000 UTC m=+1.125167178" Apr 12 21:30:09.463281 sudo[1627]: pam_unix(sudo:session): session closed for user root Apr 12 21:30:09.462000 audit[1627]: USER_END pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:30:09.464323 sshd[1624]: pam_unix(sshd:session): session closed for user core Apr 12 21:30:09.466039 systemd[1]: sshd@6-139.178.89.153:22-147.75.109.163:45394.service: Deactivated successfully. Apr 12 21:30:09.466574 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 21:30:09.466671 systemd[1]: session-9.scope: Consumed 3.434s CPU time. Apr 12 21:30:09.466999 systemd-logind[1459]: Session 9 logged out. Waiting for processes to exit. Apr 12 21:30:09.467559 systemd-logind[1459]: Removed session 9. Apr 12 21:30:09.462000 audit[1627]: CRED_DISP pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:30:09.634011 kernel: audit: type=1106 audit(1712957409.462:935): pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:30:09.634048 kernel: audit: type=1104 audit(1712957409.462:936): pid=1627 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:30:09.634061 kernel: audit: type=1106 audit(1712957409.463:937): pid=1624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:30:09.463000 audit[1624]: USER_END pid=1624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:30:09.726006 kernel: audit: type=1104 audit(1712957409.463:938): pid=1624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:30:09.463000 audit[1624]: CRED_DISP pid=1624 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:30:09.811695 kernel: audit: type=1131 audit(1712957409.464:939): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.153:22-147.75.109.163:45394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:30:09.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.153:22-147.75.109.163:45394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:30:18.635000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:18.635000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001496ac0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:18.844719 kernel: audit: type=1400 audit(1712957418.635:940): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:18.844760 kernel: audit: type=1300 audit(1712957418.635:940): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001496ac0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:18.844776 kernel: audit: type=1327 audit(1712957418.635:940): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:18.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:18.934626 kernel: audit: type=1400 audit(1712957418.637:941): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:18.637000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:18.989307 update_engine[1461]: I0412 21:30:18.989259 1461 update_attempter.cc:509] Updating boot flags... Apr 12 21:30:18.637000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328ba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:19.025278 kubelet[2586]: I0412 21:30:19.025264 2586 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 21:30:19.025495 env[1471]: time="2024-04-12T21:30:19.025439403Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 21:30:19.025638 kubelet[2586]: I0412 21:30:19.025562 2586 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 21:30:19.137542 kernel: audit: type=1300 audit(1712957418.637:941): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328ba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:19.137589 kernel: audit: type=1327 audit(1712957418.637:941): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:18.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:18.640000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:19.319549 kernel: audit: type=1400 audit(1712957418.640:942): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:19.319588 kernel: audit: type=1300 audit(1712957418.640:942): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001496c80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:18.640000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001496c80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:18.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:19.535385 kernel: audit: type=1327 audit(1712957418.640:942): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:18.642000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:19.536244 kernel: audit: type=1400 audit(1712957418.642:943): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:30:18.642000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328d60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:30:18.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:30:19.818865 kubelet[2586]: I0412 21:30:19.818655 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:19.832051 systemd[1]: Created slice kubepods-besteffort-pod2c0915c0_6abf_4867_9d58_bf723cb12dda.slice. Apr 12 21:30:19.894513 kubelet[2586]: I0412 21:30:19.894385 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2c0915c0-6abf-4867-9d58-bf723cb12dda-lib-modules\") pod \"kube-proxy-pvp6k\" (UID: \"2c0915c0-6abf-4867-9d58-bf723cb12dda\") " pod="kube-system/kube-proxy-pvp6k" Apr 12 21:30:19.894513 kubelet[2586]: I0412 21:30:19.894506 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2c0915c0-6abf-4867-9d58-bf723cb12dda-kube-proxy\") pod \"kube-proxy-pvp6k\" (UID: \"2c0915c0-6abf-4867-9d58-bf723cb12dda\") " pod="kube-system/kube-proxy-pvp6k" Apr 12 21:30:19.894954 kubelet[2586]: I0412 21:30:19.894576 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2c0915c0-6abf-4867-9d58-bf723cb12dda-xtables-lock\") pod \"kube-proxy-pvp6k\" (UID: \"2c0915c0-6abf-4867-9d58-bf723cb12dda\") " pod="kube-system/kube-proxy-pvp6k" Apr 12 21:30:19.894954 kubelet[2586]: I0412 21:30:19.894642 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltfg4\" (UniqueName: \"kubernetes.io/projected/2c0915c0-6abf-4867-9d58-bf723cb12dda-kube-api-access-ltfg4\") pod \"kube-proxy-pvp6k\" (UID: \"2c0915c0-6abf-4867-9d58-bf723cb12dda\") " pod="kube-system/kube-proxy-pvp6k" Apr 12 21:30:19.985456 kubelet[2586]: I0412 21:30:19.985363 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:19.995352 systemd[1]: Created slice kubepods-besteffort-podee048776_1a9d_4228_9c2a_48b526fa1d95.slice. Apr 12 21:30:20.096464 kubelet[2586]: I0412 21:30:20.096285 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ee048776-1a9d-4228-9c2a-48b526fa1d95-var-lib-calico\") pod \"tigera-operator-786dc9d695-n4zj5\" (UID: \"ee048776-1a9d-4228-9c2a-48b526fa1d95\") " pod="tigera-operator/tigera-operator-786dc9d695-n4zj5" Apr 12 21:30:20.096464 kubelet[2586]: I0412 21:30:20.096389 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wqcnr\" (UniqueName: \"kubernetes.io/projected/ee048776-1a9d-4228-9c2a-48b526fa1d95-kube-api-access-wqcnr\") pod \"tigera-operator-786dc9d695-n4zj5\" (UID: \"ee048776-1a9d-4228-9c2a-48b526fa1d95\") " pod="tigera-operator/tigera-operator-786dc9d695-n4zj5" Apr 12 21:30:20.153164 env[1471]: time="2024-04-12T21:30:20.153071679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pvp6k,Uid:2c0915c0-6abf-4867-9d58-bf723cb12dda,Namespace:kube-system,Attempt:0,}" Apr 12 21:30:20.175013 env[1471]: time="2024-04-12T21:30:20.174824115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:20.175013 env[1471]: time="2024-04-12T21:30:20.174924768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:20.175013 env[1471]: time="2024-04-12T21:30:20.174962809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:20.175492 env[1471]: time="2024-04-12T21:30:20.175331258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd9b1f9615cc1852812220faf6068768161a72c72e8e3dd6c70f10a71e4689eb pid=2761 runtime=io.containerd.runc.v2 Apr 12 21:30:20.205731 systemd[1]: Started cri-containerd-fd9b1f9615cc1852812220faf6068768161a72c72e8e3dd6c70f10a71e4689eb.scope. Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.222000 audit: BPF prog-id=106 op=LOAD Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2761 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396231663936313563633138353238313232323066616636303638 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2761 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396231663936313563633138353238313232323066616636303638 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit: BPF prog-id=107 op=LOAD Apr 12 21:30:20.223000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a5040 items=0 ppid=2761 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396231663936313563633138353238313232323066616636303638 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit: BPF prog-id=108 op=LOAD Apr 12 21:30:20.223000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a5088 items=0 ppid=2761 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396231663936313563633138353238313232323066616636303638 Apr 12 21:30:20.223000 audit: BPF prog-id=108 op=UNLOAD Apr 12 21:30:20.223000 audit: BPF prog-id=107 op=UNLOAD Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.223000 audit: BPF prog-id=109 op=LOAD Apr 12 21:30:20.223000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a5498 items=0 ppid=2761 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396231663936313563633138353238313232323066616636303638 Apr 12 21:30:20.235015 env[1471]: time="2024-04-12T21:30:20.234927230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pvp6k,Uid:2c0915c0-6abf-4867-9d58-bf723cb12dda,Namespace:kube-system,Attempt:0,} returns sandbox id \"fd9b1f9615cc1852812220faf6068768161a72c72e8e3dd6c70f10a71e4689eb\"" Apr 12 21:30:20.238404 env[1471]: time="2024-04-12T21:30:20.238317208Z" level=info msg="CreateContainer within sandbox \"fd9b1f9615cc1852812220faf6068768161a72c72e8e3dd6c70f10a71e4689eb\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 21:30:20.249911 env[1471]: time="2024-04-12T21:30:20.249836942Z" level=info msg="CreateContainer within sandbox \"fd9b1f9615cc1852812220faf6068768161a72c72e8e3dd6c70f10a71e4689eb\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9c1b6707b511f680b2037c317632abe4388e347784105e4e3b285976ae6aa8cb\"" Apr 12 21:30:20.250454 env[1471]: time="2024-04-12T21:30:20.250385662Z" level=info msg="StartContainer for \"9c1b6707b511f680b2037c317632abe4388e347784105e4e3b285976ae6aa8cb\"" Apr 12 21:30:20.271157 systemd[1]: Started cri-containerd-9c1b6707b511f680b2037c317632abe4388e347784105e4e3b285976ae6aa8cb.scope. Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f48d98642f8 items=0 ppid=2761 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963316236373037623531316636383062323033376333313736333261 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit: BPF prog-id=110 op=LOAD Apr 12 21:30:20.291000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024dd8 items=0 ppid=2761 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963316236373037623531316636383062323033376333313736333261 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit: BPF prog-id=111 op=LOAD Apr 12 21:30:20.291000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024e28 items=0 ppid=2761 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963316236373037623531316636383062323033376333313736333261 Apr 12 21:30:20.291000 audit: BPF prog-id=111 op=UNLOAD Apr 12 21:30:20.291000 audit: BPF prog-id=110 op=UNLOAD Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.291000 audit: BPF prog-id=112 op=LOAD Apr 12 21:30:20.291000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024eb8 items=0 ppid=2761 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963316236373037623531316636383062323033376333313736333261 Apr 12 21:30:20.300218 env[1471]: time="2024-04-12T21:30:20.300168140Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-n4zj5,Uid:ee048776-1a9d-4228-9c2a-48b526fa1d95,Namespace:tigera-operator,Attempt:0,}" Apr 12 21:30:20.313680 env[1471]: time="2024-04-12T21:30:20.313592264Z" level=info msg="StartContainer for \"9c1b6707b511f680b2037c317632abe4388e347784105e4e3b285976ae6aa8cb\" returns successfully" Apr 12 21:30:20.325761 env[1471]: time="2024-04-12T21:30:20.325602318Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:20.325761 env[1471]: time="2024-04-12T21:30:20.325667108Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:20.325761 env[1471]: time="2024-04-12T21:30:20.325686797Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:20.326030 env[1471]: time="2024-04-12T21:30:20.325927831Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb818c57b11efcb5129120745bfe03272dab4096f9a0184f919d441c72478abf pid=2843 runtime=io.containerd.runc.v2 Apr 12 21:30:20.341882 systemd[1]: Started cri-containerd-eb818c57b11efcb5129120745bfe03272dab4096f9a0184f919d441c72478abf.scope. Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.353000 audit: BPF prog-id=113 op=LOAD Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2843 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383138633537623131656663623531323931323037343562666530 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2843 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383138633537623131656663623531323931323037343562666530 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit: BPF prog-id=114 op=LOAD Apr 12 21:30:20.354000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00025fce0 items=0 ppid=2843 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383138633537623131656663623531323931323037343562666530 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit: BPF prog-id=115 op=LOAD Apr 12 21:30:20.354000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00025fd28 items=0 ppid=2843 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383138633537623131656663623531323931323037343562666530 Apr 12 21:30:20.354000 audit: BPF prog-id=115 op=UNLOAD Apr 12 21:30:20.354000 audit: BPF prog-id=114 op=UNLOAD Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { perfmon } for pid=2857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit[2857]: AVC avc: denied { bpf } for pid=2857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:20.354000 audit: BPF prog-id=116 op=LOAD Apr 12 21:30:20.354000 audit[2857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e4138 items=0 ppid=2843 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383138633537623131656663623531323931323037343562666530 Apr 12 21:30:20.367000 audit[2897]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.367000 audit[2897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6d8ce910 a2=0 a3=7ffc6d8ce8fc items=0 ppid=2812 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 21:30:20.367000 audit[2898]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.367000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd37ecbe20 a2=0 a3=7ffd37ecbe0c items=0 ppid=2812 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 21:30:20.368000 audit[2899]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.368000 audit[2899]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe9e9f7c0 a2=0 a3=7fffe9e9f7ac items=0 ppid=2812 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 21:30:20.368000 audit[2900]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.368000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb53a34a0 a2=0 a3=7ffcb53a348c items=0 ppid=2812 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 21:30:20.369000 audit[2901]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.369000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcd7cd4d0 a2=0 a3=7fffcd7cd4bc items=0 ppid=2812 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 21:30:20.369000 audit[2902]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.369000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffefd31630 a2=0 a3=7fffefd3161c items=0 ppid=2812 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 21:30:20.379875 env[1471]: time="2024-04-12T21:30:20.379843824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-n4zj5,Uid:ee048776-1a9d-4228-9c2a-48b526fa1d95,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"eb818c57b11efcb5129120745bfe03272dab4096f9a0184f919d441c72478abf\"" Apr 12 21:30:20.380737 env[1471]: time="2024-04-12T21:30:20.380723564Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 21:30:20.455325 kubelet[2586]: I0412 21:30:20.455217 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pvp6k" podStartSLOduration=1.455129135 podCreationTimestamp="2024-04-12 21:30:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:30:20.454557807 +0000 UTC m=+15.157034824" watchObservedRunningTime="2024-04-12 21:30:20.455129135 +0000 UTC m=+15.157606132" Apr 12 21:30:20.475000 audit[2909]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.475000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0b02aa90 a2=0 a3=7ffd0b02aa7c items=0 ppid=2812 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 21:30:20.481000 audit[2911]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.481000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc49ee3f70 a2=0 a3=7ffc49ee3f5c items=0 ppid=2812 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 21:30:20.490000 audit[2914]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.490000 audit[2914]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffce478d8d0 a2=0 a3=7ffce478d8bc items=0 ppid=2812 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 21:30:20.493000 audit[2915]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.493000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc23f01650 a2=0 a3=7ffc23f0163c items=0 ppid=2812 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 21:30:20.499000 audit[2917]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.499000 audit[2917]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5163a5b0 a2=0 a3=7ffc5163a59c items=0 ppid=2812 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 21:30:20.501000 audit[2918]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.501000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9f97e630 a2=0 a3=7ffc9f97e61c items=0 ppid=2812 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 21:30:20.508000 audit[2920]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.508000 audit[2920]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff4f067f0 a2=0 a3=7ffff4f067dc items=0 ppid=2812 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 21:30:20.517000 audit[2923]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.517000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca35f7c10 a2=0 a3=7ffca35f7bfc items=0 ppid=2812 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 21:30:20.520000 audit[2924]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.520000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf57c9ec0 a2=0 a3=7ffcf57c9eac items=0 ppid=2812 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 21:30:20.526000 audit[2926]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.526000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4ec08540 a2=0 a3=7ffd4ec0852c items=0 ppid=2812 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 21:30:20.529000 audit[2927]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.529000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8af901f0 a2=0 a3=7fff8af901dc items=0 ppid=2812 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 21:30:20.535000 audit[2929]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.535000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc46b2d860 a2=0 a3=7ffc46b2d84c items=0 ppid=2812 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:30:20.544000 audit[2932]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.544000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8d4aad90 a2=0 a3=7ffd8d4aad7c items=0 ppid=2812 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:30:20.553000 audit[2935]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.553000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe640a8de0 a2=0 a3=7ffe640a8dcc items=0 ppid=2812 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 21:30:20.556000 audit[2936]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.556000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed9bb47f0 a2=0 a3=7ffed9bb47dc items=0 ppid=2812 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 21:30:20.562000 audit[2938]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.562000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff82e3d100 a2=0 a3=7fff82e3d0ec items=0 ppid=2812 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:30:20.570000 audit[2941]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.570000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc70d1f4a0 a2=0 a3=7ffc70d1f48c items=0 ppid=2812 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:30:20.585000 audit[2946]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.585000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffdf14820 a2=0 a3=7ffffdf1480c items=0 ppid=2812 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 21:30:20.591000 audit[2948]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:30:20.591000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff05d71500 a2=0 a3=7fff05d714ec items=0 ppid=2812 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 21:30:20.628000 audit[2950]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:20.628000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffef5a82c10 a2=0 a3=7ffef5a82bfc items=0 ppid=2812 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:20.640000 audit[2950]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:20.640000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffef5a82c10 a2=0 a3=7ffef5a82bfc items=0 ppid=2812 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:20.641000 audit[2954]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.641000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd1a0a6ad0 a2=0 a3=7ffd1a0a6abc items=0 ppid=2812 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 21:30:20.643000 audit[2956]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.643000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff7115a060 a2=0 a3=7fff7115a04c items=0 ppid=2812 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 21:30:20.647000 audit[2959]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.647000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2888afa0 a2=0 a3=7ffe2888af8c items=0 ppid=2812 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 21:30:20.648000 audit[2960]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.648000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce8f73100 a2=0 a3=7ffce8f730ec items=0 ppid=2812 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 21:30:20.650000 audit[2962]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.650000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffcb79c580 a2=0 a3=7fffcb79c56c items=0 ppid=2812 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 21:30:20.651000 audit[2963]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.651000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea5d59760 a2=0 a3=7ffea5d5974c items=0 ppid=2812 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 21:30:20.653000 audit[2965]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.653000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff2afb7670 a2=0 a3=7fff2afb765c items=0 ppid=2812 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 21:30:20.656000 audit[2968]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.656000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff50fe5d10 a2=0 a3=7fff50fe5cfc items=0 ppid=2812 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 21:30:20.657000 audit[2969]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.657000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd053c9ea0 a2=0 a3=7ffd053c9e8c items=0 ppid=2812 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 21:30:20.659000 audit[2971]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.659000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3c1a4fb0 a2=0 a3=7ffd3c1a4f9c items=0 ppid=2812 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 21:30:20.660000 audit[2972]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.660000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe22b47800 a2=0 a3=7ffe22b477ec items=0 ppid=2812 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 21:30:20.663000 audit[2974]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.663000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfdea97e0 a2=0 a3=7ffdfdea97cc items=0 ppid=2812 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:30:20.666000 audit[2977]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.666000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffba3da430 a2=0 a3=7fffba3da41c items=0 ppid=2812 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 21:30:20.669000 audit[2980]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.669000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb569f0a0 a2=0 a3=7ffdb569f08c items=0 ppid=2812 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 21:30:20.670000 audit[2981]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.670000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd93bd820 a2=0 a3=7ffcd93bd80c items=0 ppid=2812 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 21:30:20.672000 audit[2983]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.672000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc8e88eb30 a2=0 a3=7ffc8e88eb1c items=0 ppid=2812 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:30:20.675000 audit[2986]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.675000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff05a38a50 a2=0 a3=7fff05a38a3c items=0 ppid=2812 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:30:20.676000 audit[2987]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.676000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff6cfee50 a2=0 a3=7ffff6cfee3c items=0 ppid=2812 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 21:30:20.678000 audit[2989]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.678000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc44809bb0 a2=0 a3=7ffc44809b9c items=0 ppid=2812 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:30:20.681000 audit[2992]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.681000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff309b8080 a2=0 a3=7fff309b806c items=0 ppid=2812 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:30:20.682000 audit[2993]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.682000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde2878920 a2=0 a3=7ffde287890c items=0 ppid=2812 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 21:30:20.684000 audit[2995]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:30:20.684000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda9eeb6c0 a2=0 a3=7ffda9eeb6ac items=0 ppid=2812 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 21:30:20.687000 audit[2997]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 21:30:20.687000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc91bdd5b0 a2=0 a3=7ffc91bdd59c items=0 ppid=2812 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.687000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:20.687000 audit[2997]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 21:30:20.687000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc91bdd5b0 a2=0 a3=7ffc91bdd59c items=0 ppid=2812 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:20.687000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:22.026500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2920561141.mount: Deactivated successfully. Apr 12 21:30:22.938860 env[1471]: time="2024-04-12T21:30:22.938789003Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:22.940109 env[1471]: time="2024-04-12T21:30:22.940094116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:22.941966 env[1471]: time="2024-04-12T21:30:22.941953515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:22.942880 env[1471]: time="2024-04-12T21:30:22.942868637Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:22.943708 env[1471]: time="2024-04-12T21:30:22.943693058Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 21:30:22.944795 env[1471]: time="2024-04-12T21:30:22.944782787Z" level=info msg="CreateContainer within sandbox \"eb818c57b11efcb5129120745bfe03272dab4096f9a0184f919d441c72478abf\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 21:30:22.949560 env[1471]: time="2024-04-12T21:30:22.949538766Z" level=info msg="CreateContainer within sandbox \"eb818c57b11efcb5129120745bfe03272dab4096f9a0184f919d441c72478abf\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1aacfd9f978bd6a6136f920922cebdb12e41021bcb04e2ca5eb2b9a8dbe02b8a\"" Apr 12 21:30:22.949888 env[1471]: time="2024-04-12T21:30:22.949871141Z" level=info msg="StartContainer for \"1aacfd9f978bd6a6136f920922cebdb12e41021bcb04e2ca5eb2b9a8dbe02b8a\"" Apr 12 21:30:22.950757 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2052773931.mount: Deactivated successfully. Apr 12 21:30:22.958199 systemd[1]: Started cri-containerd-1aacfd9f978bd6a6136f920922cebdb12e41021bcb04e2ca5eb2b9a8dbe02b8a.scope. Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit: BPF prog-id=117 op=LOAD Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2843 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161616366643966393738626436613631333666393230393232636562 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2843 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161616366643966393738626436613631333666393230393232636562 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit: BPF prog-id=118 op=LOAD Apr 12 21:30:22.965000 audit[3005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000249f0 items=0 ppid=2843 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161616366643966393738626436613631333666393230393232636562 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit: BPF prog-id=119 op=LOAD Apr 12 21:30:22.965000 audit[3005]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024a38 items=0 ppid=2843 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161616366643966393738626436613631333666393230393232636562 Apr 12 21:30:22.965000 audit: BPF prog-id=119 op=UNLOAD Apr 12 21:30:22.965000 audit: BPF prog-id=118 op=UNLOAD Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:22.965000 audit: BPF prog-id=120 op=LOAD Apr 12 21:30:22.965000 audit[3005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000024e48 items=0 ppid=2843 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:22.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161616366643966393738626436613631333666393230393232636562 Apr 12 21:30:22.971204 env[1471]: time="2024-04-12T21:30:22.971179400Z" level=info msg="StartContainer for \"1aacfd9f978bd6a6136f920922cebdb12e41021bcb04e2ca5eb2b9a8dbe02b8a\" returns successfully" Apr 12 21:30:23.464677 kubelet[2586]: I0412 21:30:23.464602 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-786dc9d695-n4zj5" podStartSLOduration=1.901101658 podCreationTimestamp="2024-04-12 21:30:19 +0000 UTC" firstStartedPulling="2024-04-12 21:30:20.380455565 +0000 UTC m=+15.082932522" lastFinishedPulling="2024-04-12 21:30:22.943864138 +0000 UTC m=+17.646341085" observedRunningTime="2024-04-12 21:30:23.463924525 +0000 UTC m=+18.166401541" watchObservedRunningTime="2024-04-12 21:30:23.464510221 +0000 UTC m=+18.166987219" Apr 12 21:30:24.629000 audit[3049]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:24.657658 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 21:30:24.657723 kernel: audit: type=1325 audit(1712957424.629:1055): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:24.629000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffcff5cb20 a2=0 a3=7fffcff5cb0c items=0 ppid=2812 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:24.741820 kubelet[2586]: I0412 21:30:24.741801 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:24.745313 systemd[1]: Created slice kubepods-besteffort-pod13fc0f68_3543_43e2_a50a_dfeee2de68ea.slice. Apr 12 21:30:24.760929 kubelet[2586]: I0412 21:30:24.760902 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:24.763633 systemd[1]: Created slice kubepods-besteffort-pod85d6df21_8bcf_4172_8e0d_40d26377ae85.slice. Apr 12 21:30:24.814788 kernel: audit: type=1300 audit(1712957424.629:1055): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffcff5cb20 a2=0 a3=7fffcff5cb0c items=0 ppid=2812 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:24.814838 kernel: audit: type=1327 audit(1712957424.629:1055): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:24.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:24.827033 kubelet[2586]: I0412 21:30:24.826991 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-cni-log-dir\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827033 kubelet[2586]: I0412 21:30:24.827015 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/13fc0f68-3543-43e2-a50a-dfeee2de68ea-tigera-ca-bundle\") pod \"calico-typha-7c7cdcd598-xbhr9\" (UID: \"13fc0f68-3543-43e2-a50a-dfeee2de68ea\") " pod="calico-system/calico-typha-7c7cdcd598-xbhr9" Apr 12 21:30:24.827033 kubelet[2586]: I0412 21:30:24.827028 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dnvhv\" (UniqueName: \"kubernetes.io/projected/85d6df21-8bcf-4172-8e0d-40d26377ae85-kube-api-access-dnvhv\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827131 kubelet[2586]: I0412 21:30:24.827040 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-lib-modules\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827131 kubelet[2586]: I0412 21:30:24.827051 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-policysync\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827166 kubelet[2586]: I0412 21:30:24.827134 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6g8t5\" (UniqueName: \"kubernetes.io/projected/13fc0f68-3543-43e2-a50a-dfeee2de68ea-kube-api-access-6g8t5\") pod \"calico-typha-7c7cdcd598-xbhr9\" (UID: \"13fc0f68-3543-43e2-a50a-dfeee2de68ea\") " pod="calico-system/calico-typha-7c7cdcd598-xbhr9" Apr 12 21:30:24.827185 kubelet[2586]: I0412 21:30:24.827171 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/85d6df21-8bcf-4172-8e0d-40d26377ae85-tigera-ca-bundle\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827210 kubelet[2586]: I0412 21:30:24.827204 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-cni-net-dir\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827299 kubelet[2586]: I0412 21:30:24.827256 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/13fc0f68-3543-43e2-a50a-dfeee2de68ea-typha-certs\") pod \"calico-typha-7c7cdcd598-xbhr9\" (UID: \"13fc0f68-3543-43e2-a50a-dfeee2de68ea\") " pod="calico-system/calico-typha-7c7cdcd598-xbhr9" Apr 12 21:30:24.827299 kubelet[2586]: I0412 21:30:24.827279 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/85d6df21-8bcf-4172-8e0d-40d26377ae85-node-certs\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827351 kubelet[2586]: I0412 21:30:24.827303 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-var-run-calico\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827351 kubelet[2586]: I0412 21:30:24.827331 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-var-lib-calico\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827391 kubelet[2586]: I0412 21:30:24.827359 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-xtables-lock\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827411 kubelet[2586]: I0412 21:30:24.827393 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-cni-bin-dir\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.827429 kubelet[2586]: I0412 21:30:24.827416 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/85d6df21-8bcf-4172-8e0d-40d26377ae85-flexvol-driver-host\") pod \"calico-node-x84cb\" (UID: \"85d6df21-8bcf-4172-8e0d-40d26377ae85\") " pod="calico-system/calico-node-x84cb" Apr 12 21:30:24.864369 kubelet[2586]: I0412 21:30:24.864349 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:24.864546 kubelet[2586]: E0412 21:30:24.864535 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:24.629000 audit[3049]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:24.927906 kubelet[2586]: I0412 21:30:24.927882 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4-socket-dir\") pod \"csi-node-driver-xxfd9\" (UID: \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\") " pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:24.928004 kubelet[2586]: I0412 21:30:24.927924 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wclnr\" (UniqueName: \"kubernetes.io/projected/0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4-kube-api-access-wclnr\") pod \"csi-node-driver-xxfd9\" (UID: \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\") " pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:24.928053 kubelet[2586]: I0412 21:30:24.928005 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4-varrun\") pod \"csi-node-driver-xxfd9\" (UID: \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\") " pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:24.928053 kubelet[2586]: I0412 21:30:24.928030 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4-registration-dir\") pod \"csi-node-driver-xxfd9\" (UID: \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\") " pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:24.928211 kubelet[2586]: I0412 21:30:24.928196 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4-kubelet-dir\") pod \"csi-node-driver-xxfd9\" (UID: \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\") " pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:24.928837 kubelet[2586]: E0412 21:30:24.928826 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:24.928874 kubelet[2586]: W0412 21:30:24.928838 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:24.928874 kubelet[2586]: E0412 21:30:24.928856 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:24.928973 kubelet[2586]: E0412 21:30:24.928966 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:24.928973 kubelet[2586]: W0412 21:30:24.928972 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:24.929028 kubelet[2586]: E0412 21:30:24.928980 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:24.929881 kubelet[2586]: E0412 21:30:24.929872 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:24.929881 kubelet[2586]: W0412 21:30:24.929878 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:24.929959 kubelet[2586]: E0412 21:30:24.929889 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:24.929995 kubelet[2586]: E0412 21:30:24.929984 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:24.929995 kubelet[2586]: W0412 21:30:24.929988 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:24.929995 kubelet[2586]: E0412 21:30:24.929996 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:24.933332 kubelet[2586]: E0412 21:30:24.933306 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:24.933332 kubelet[2586]: W0412 21:30:24.933314 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:24.933332 kubelet[2586]: E0412 21:30:24.933325 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:24.933691 kubelet[2586]: E0412 21:30:24.933684 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:24.933721 kubelet[2586]: W0412 21:30:24.933692 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:24.933721 kubelet[2586]: E0412 21:30:24.933704 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:24.629000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffcff5cb20 a2=0 a3=0 items=0 ppid=2812 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.028731 kubelet[2586]: E0412 21:30:25.028715 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.028731 kubelet[2586]: W0412 21:30:25.028726 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.028859 kubelet[2586]: E0412 21:30:25.028742 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.028896 kubelet[2586]: E0412 21:30:25.028874 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.028896 kubelet[2586]: W0412 21:30:25.028881 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.028896 kubelet[2586]: E0412 21:30:25.028894 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029007 kubelet[2586]: E0412 21:30:25.029000 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029007 kubelet[2586]: W0412 21:30:25.029006 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029071 kubelet[2586]: E0412 21:30:25.029019 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029124 kubelet[2586]: E0412 21:30:25.029118 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029124 kubelet[2586]: W0412 21:30:25.029124 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029184 kubelet[2586]: E0412 21:30:25.029134 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029241 kubelet[2586]: E0412 21:30:25.029230 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029275 kubelet[2586]: W0412 21:30:25.029241 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029275 kubelet[2586]: E0412 21:30:25.029250 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029398 kubelet[2586]: E0412 21:30:25.029363 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029398 kubelet[2586]: W0412 21:30:25.029370 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029398 kubelet[2586]: E0412 21:30:25.029379 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029470 kubelet[2586]: E0412 21:30:25.029458 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029470 kubelet[2586]: W0412 21:30:25.029462 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029470 kubelet[2586]: E0412 21:30:25.029469 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029574 kubelet[2586]: E0412 21:30:25.029534 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029574 kubelet[2586]: W0412 21:30:25.029539 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029574 kubelet[2586]: E0412 21:30:25.029547 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029645 kubelet[2586]: E0412 21:30:25.029632 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029645 kubelet[2586]: W0412 21:30:25.029636 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029645 kubelet[2586]: E0412 21:30:25.029642 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029759 kubelet[2586]: E0412 21:30:25.029724 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029759 kubelet[2586]: W0412 21:30:25.029730 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029759 kubelet[2586]: E0412 21:30:25.029740 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029829 kubelet[2586]: E0412 21:30:25.029812 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029829 kubelet[2586]: W0412 21:30:25.029816 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029829 kubelet[2586]: E0412 21:30:25.029823 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.029892 kubelet[2586]: E0412 21:30:25.029887 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.029892 kubelet[2586]: W0412 21:30:25.029891 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.029927 kubelet[2586]: E0412 21:30:25.029899 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030047 kubelet[2586]: E0412 21:30:25.030040 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030047 kubelet[2586]: W0412 21:30:25.030046 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030094 kubelet[2586]: E0412 21:30:25.030054 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030142 kubelet[2586]: E0412 21:30:25.030137 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030162 kubelet[2586]: W0412 21:30:25.030142 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030162 kubelet[2586]: E0412 21:30:25.030150 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030219 kubelet[2586]: E0412 21:30:25.030214 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030248 kubelet[2586]: W0412 21:30:25.030219 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030248 kubelet[2586]: E0412 21:30:25.030236 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030296 kubelet[2586]: E0412 21:30:25.030291 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030321 kubelet[2586]: W0412 21:30:25.030296 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030321 kubelet[2586]: E0412 21:30:25.030310 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030369 kubelet[2586]: E0412 21:30:25.030364 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030369 kubelet[2586]: W0412 21:30:25.030368 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030408 kubelet[2586]: E0412 21:30:25.030383 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030461 kubelet[2586]: E0412 21:30:25.030456 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030480 kubelet[2586]: W0412 21:30:25.030461 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030480 kubelet[2586]: E0412 21:30:25.030471 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030551 kubelet[2586]: E0412 21:30:25.030547 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030571 kubelet[2586]: W0412 21:30:25.030551 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030571 kubelet[2586]: E0412 21:30:25.030560 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030705 kubelet[2586]: E0412 21:30:25.030699 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030705 kubelet[2586]: W0412 21:30:25.030704 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030757 kubelet[2586]: E0412 21:30:25.030715 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030798 kubelet[2586]: E0412 21:30:25.030794 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030798 kubelet[2586]: W0412 21:30:25.030798 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030838 kubelet[2586]: E0412 21:30:25.030805 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030886 kubelet[2586]: E0412 21:30:25.030882 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030886 kubelet[2586]: W0412 21:30:25.030886 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030931 kubelet[2586]: E0412 21:30:25.030892 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.030975 kubelet[2586]: E0412 21:30:25.030970 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.030995 kubelet[2586]: W0412 21:30:25.030974 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.030995 kubelet[2586]: E0412 21:30:25.030983 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.031066 kubelet[2586]: E0412 21:30:25.031061 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.031086 kubelet[2586]: W0412 21:30:25.031067 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.031086 kubelet[2586]: E0412 21:30:25.031077 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.031197 kubelet[2586]: E0412 21:30:25.031191 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.031217 kubelet[2586]: W0412 21:30:25.031197 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.031217 kubelet[2586]: E0412 21:30:25.031206 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.036046 kubelet[2586]: E0412 21:30:25.036036 2586 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:30:25.036046 kubelet[2586]: W0412 21:30:25.036044 2586 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:30:25.036116 kubelet[2586]: E0412 21:30:25.036054 2586 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:30:25.036473 kernel: audit: type=1325 audit(1712957424.629:1056): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:25.036501 kernel: audit: type=1300 audit(1712957424.629:1056): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffcff5cb20 a2=0 a3=0 items=0 ppid=2812 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.036515 kernel: audit: type=1327 audit(1712957424.629:1056): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:24.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:25.052385 env[1471]: time="2024-04-12T21:30:25.052348265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c7cdcd598-xbhr9,Uid:13fc0f68-3543-43e2-a50a-dfeee2de68ea,Namespace:calico-system,Attempt:0,}" Apr 12 21:30:25.060131 env[1471]: time="2024-04-12T21:30:25.060096760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:25.060131 env[1471]: time="2024-04-12T21:30:25.060117194Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:25.060131 env[1471]: time="2024-04-12T21:30:25.060124041Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:25.060264 env[1471]: time="2024-04-12T21:30:25.060181665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/605c49a5c0b021db693a959efadd9fab9754100d63e06959ce9ec862c5cc16e1 pid=3097 runtime=io.containerd.runc.v2 Apr 12 21:30:25.065627 env[1471]: time="2024-04-12T21:30:25.065598508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x84cb,Uid:85d6df21-8bcf-4172-8e0d-40d26377ae85,Namespace:calico-system,Attempt:0,}" Apr 12 21:30:25.065869 systemd[1]: Started cri-containerd-605c49a5c0b021db693a959efadd9fab9754100d63e06959ce9ec862c5cc16e1.scope. Apr 12 21:30:25.071941 env[1471]: time="2024-04-12T21:30:25.071902070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:25.071941 env[1471]: time="2024-04-12T21:30:25.071925138Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:25.071941 env[1471]: time="2024-04-12T21:30:25.071932484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:25.072101 env[1471]: time="2024-04-12T21:30:25.072010669Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3 pid=3123 runtime=io.containerd.runc.v2 Apr 12 21:30:25.077437 systemd[1]: Started cri-containerd-9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3.scope. Apr 12 21:30:24.881000 audit[3051]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:24.881000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff64f56660 a2=0 a3=7fff64f5664c items=0 ppid=2812 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.255942 kernel: audit: type=1325 audit(1712957424.881:1057): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:25.256004 kernel: audit: type=1300 audit(1712957424.881:1057): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff64f56660 a2=0 a3=7fff64f5664c items=0 ppid=2812 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.256021 kernel: audit: type=1327 audit(1712957424.881:1057): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:24.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:25.314423 kernel: audit: type=1400 audit(1712957425.102:1058): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.254000 audit: BPF prog-id=121 op=LOAD Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3123 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313138333036343932323665663232343033653935383165643739 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3123 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313138333036343932323665663232343033653935383165643739 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.255000 audit: BPF prog-id=122 op=LOAD Apr 12 21:30:25.255000 audit[3132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185c80 items=0 ppid=3123 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313138333036343932323665663232343033653935383165643739 Apr 12 21:30:25.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit: BPF prog-id=123 op=LOAD Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.376000 audit: BPF prog-id=124 op=LOAD Apr 12 21:30:25.376000 audit[3132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185cc8 items=0 ppid=3123 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313138333036343932323665663232343033653935383165643739 Apr 12 21:30:25.377000 audit: BPF prog-id=124 op=UNLOAD Apr 12 21:30:25.377000 audit: BPF prog-id=122 op=UNLOAD Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { perfmon } for pid=3132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3132]: AVC avc: denied { bpf } for pid=3132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit: BPF prog-id=125 op=LOAD Apr 12 21:30:25.377000 audit[3132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c00d8 items=0 ppid=3123 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313138333036343932323665663232343033653935383165643739 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3097 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356334396135633062303231646236393361393539656661646439 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3097 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356334396135633062303231646236393361393539656661646439 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit: BPF prog-id=126 op=LOAD Apr 12 21:30:25.377000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038aac0 items=0 ppid=3097 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356334396135633062303231646236393361393539656661646439 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3051]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit: BPF prog-id=127 op=LOAD Apr 12 21:30:25.377000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038ab08 items=0 ppid=3097 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff64f56660 a2=0 a3=0 items=0 ppid=2812 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356334396135633062303231646236393361393539656661646439 Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:25.377000 audit: BPF prog-id=127 op=UNLOAD Apr 12 21:30:25.377000 audit: BPF prog-id=126 op=UNLOAD Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:25.377000 audit: BPF prog-id=128 op=LOAD Apr 12 21:30:25.377000 audit[3106]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038af18 items=0 ppid=3097 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:25.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630356334396135633062303231646236393361393539656661646439 Apr 12 21:30:25.383055 env[1471]: time="2024-04-12T21:30:25.383025937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x84cb,Uid:85d6df21-8bcf-4172-8e0d-40d26377ae85,Namespace:calico-system,Attempt:0,} returns sandbox id \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\"" Apr 12 21:30:25.383814 env[1471]: time="2024-04-12T21:30:25.383802012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 21:30:25.395603 env[1471]: time="2024-04-12T21:30:25.395545095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c7cdcd598-xbhr9,Uid:13fc0f68-3543-43e2-a50a-dfeee2de68ea,Namespace:calico-system,Attempt:0,} returns sandbox id \"605c49a5c0b021db693a959efadd9fab9754100d63e06959ce9ec862c5cc16e1\"" Apr 12 21:30:26.399823 kubelet[2586]: E0412 21:30:26.399738 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:28.399861 kubelet[2586]: E0412 21:30:28.399772 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:28.845074 env[1471]: time="2024-04-12T21:30:28.844957019Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:28.846409 env[1471]: time="2024-04-12T21:30:28.846355810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:28.848970 env[1471]: time="2024-04-12T21:30:28.848941463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:28.851789 env[1471]: time="2024-04-12T21:30:28.851728501Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:28.853699 env[1471]: time="2024-04-12T21:30:28.853640962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 21:30:28.854191 env[1471]: time="2024-04-12T21:30:28.854164074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 21:30:28.856076 env[1471]: time="2024-04-12T21:30:28.856024020Z" level=info msg="CreateContainer within sandbox \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 21:30:28.864102 env[1471]: time="2024-04-12T21:30:28.864039284Z" level=info msg="CreateContainer within sandbox \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4\"" Apr 12 21:30:28.864514 env[1471]: time="2024-04-12T21:30:28.864455623Z" level=info msg="StartContainer for \"d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4\"" Apr 12 21:30:28.883703 systemd[1]: Started cri-containerd-d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4.scope. Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7d23864a18 items=0 ppid=3123 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:28.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433316539616133356536613133386564393831313763613461663830 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.897000 audit: BPF prog-id=129 op=LOAD Apr 12 21:30:28.897000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ba8 items=0 ppid=3123 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:28.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433316539616133356536613133386564393831313763613461663830 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit: BPF prog-id=130 op=LOAD Apr 12 21:30:28.898000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9bf8 items=0 ppid=3123 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:28.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433316539616133356536613133386564393831313763613461663830 Apr 12 21:30:28.898000 audit: BPF prog-id=130 op=UNLOAD Apr 12 21:30:28.898000 audit: BPF prog-id=129 op=UNLOAD Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { perfmon } for pid=3179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit[3179]: AVC avc: denied { bpf } for pid=3179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:28.898000 audit: BPF prog-id=131 op=LOAD Apr 12 21:30:28.898000 audit[3179]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c88 items=0 ppid=3123 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:28.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433316539616133356536613133386564393831313763613461663830 Apr 12 21:30:28.910329 env[1471]: time="2024-04-12T21:30:28.910278254Z" level=info msg="StartContainer for \"d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4\" returns successfully" Apr 12 21:30:28.922768 systemd[1]: cri-containerd-d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4.scope: Deactivated successfully. Apr 12 21:30:28.940000 audit: BPF prog-id=131 op=UNLOAD Apr 12 21:30:28.943257 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4-rootfs.mount: Deactivated successfully. Apr 12 21:30:29.195139 env[1471]: time="2024-04-12T21:30:29.195023091Z" level=info msg="shim disconnected" id=d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4 Apr 12 21:30:29.195689 env[1471]: time="2024-04-12T21:30:29.195136411Z" level=warning msg="cleaning up after shim disconnected" id=d31e9aa35e6a138ed98117ca4af80dda743443b9d3999c709d3ac362b57857d4 namespace=k8s.io Apr 12 21:30:29.195689 env[1471]: time="2024-04-12T21:30:29.195184219Z" level=info msg="cleaning up dead shim" Apr 12 21:30:29.212714 env[1471]: time="2024-04-12T21:30:29.212590870Z" level=warning msg="cleanup warnings time=\"2024-04-12T21:30:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3217 runtime=io.containerd.runc.v2\n" Apr 12 21:30:30.336548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2985372438.mount: Deactivated successfully. Apr 12 21:30:30.400323 kubelet[2586]: E0412 21:30:30.400233 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:31.883550 env[1471]: time="2024-04-12T21:30:31.883523093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:31.884160 env[1471]: time="2024-04-12T21:30:31.884147792Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:31.885207 env[1471]: time="2024-04-12T21:30:31.885188396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:31.886105 env[1471]: time="2024-04-12T21:30:31.886093436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:31.887022 env[1471]: time="2024-04-12T21:30:31.887008547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 21:30:31.887422 env[1471]: time="2024-04-12T21:30:31.887409191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 21:30:31.891391 env[1471]: time="2024-04-12T21:30:31.891374020Z" level=info msg="CreateContainer within sandbox \"605c49a5c0b021db693a959efadd9fab9754100d63e06959ce9ec862c5cc16e1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 21:30:31.896089 env[1471]: time="2024-04-12T21:30:31.896069021Z" level=info msg="CreateContainer within sandbox \"605c49a5c0b021db693a959efadd9fab9754100d63e06959ce9ec862c5cc16e1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"61b81ecca9fef2ae2646c1c61437a3fe9fd900e2627fe76ac047291af80d12dd\"" Apr 12 21:30:31.896409 env[1471]: time="2024-04-12T21:30:31.896378169Z" level=info msg="StartContainer for \"61b81ecca9fef2ae2646c1c61437a3fe9fd900e2627fe76ac047291af80d12dd\"" Apr 12 21:30:31.904117 systemd[1]: Started cri-containerd-61b81ecca9fef2ae2646c1c61437a3fe9fd900e2627fe76ac047291af80d12dd.scope. Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.938860 kernel: kauditd_printk_skb: 160 callbacks suppressed Apr 12 21:30:31.938907 kernel: audit: type=1400 audit(1712957431.910:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.065747 kernel: audit: type=1400 audit(1712957431.910:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.065782 kernel: audit: type=1400 audit(1712957431.910:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.129158 kernel: audit: type=1400 audit(1712957431.910:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.192984 kernel: audit: type=1400 audit(1712957431.910:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.256930 kernel: audit: type=1400 audit(1712957431.910:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.320840 kernel: audit: type=1400 audit(1712957431.910:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.384831 kernel: audit: type=1400 audit(1712957431.910:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.400126 kubelet[2586]: E0412 21:30:32.400114 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:32.448783 kernel: audit: type=1400 audit(1712957431.910:1110): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:31.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.512389 kernel: audit: type=1400 audit(1712957432.000:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.000000 audit: BPF prog-id=132 op=LOAD Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3097 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:32.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623831656363613966656632616532363436633163363134333761 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3097 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:32.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623831656363613966656632616532363436633163363134333761 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.001000 audit: BPF prog-id=133 op=LOAD Apr 12 21:30:32.001000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003042c0 items=0 ppid=3097 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:32.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623831656363613966656632616532363436633163363134333761 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.127000 audit: BPF prog-id=134 op=LOAD Apr 12 21:30:32.127000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304308 items=0 ppid=3097 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:32.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623831656363613966656632616532363436633163363134333761 Apr 12 21:30:32.255000 audit: BPF prog-id=134 op=UNLOAD Apr 12 21:30:32.255000 audit: BPF prog-id=133 op=UNLOAD Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:32.255000 audit: BPF prog-id=135 op=LOAD Apr 12 21:30:32.255000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304718 items=0 ppid=3097 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:32.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623831656363613966656632616532363436633163363134333761 Apr 12 21:30:32.591890 env[1471]: time="2024-04-12T21:30:32.591866549Z" level=info msg="StartContainer for \"61b81ecca9fef2ae2646c1c61437a3fe9fd900e2627fe76ac047291af80d12dd\" returns successfully" Apr 12 21:30:33.351749 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2178625652.mount: Deactivated successfully. Apr 12 21:30:33.485779 kubelet[2586]: I0412 21:30:33.485750 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7c7cdcd598-xbhr9" podStartSLOduration=2.994700676 podCreationTimestamp="2024-04-12 21:30:24 +0000 UTC" firstStartedPulling="2024-04-12 21:30:25.396154929 +0000 UTC m=+20.098631874" lastFinishedPulling="2024-04-12 21:30:31.887171337 +0000 UTC m=+26.589648284" observedRunningTime="2024-04-12 21:30:33.485489465 +0000 UTC m=+28.187966418" watchObservedRunningTime="2024-04-12 21:30:33.485717086 +0000 UTC m=+28.188194035" Apr 12 21:30:34.400569 kubelet[2586]: E0412 21:30:34.400497 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:34.478662 kubelet[2586]: I0412 21:30:34.478640 2586 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:30:36.399742 kubelet[2586]: E0412 21:30:36.399721 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:37.135425 env[1471]: time="2024-04-12T21:30:37.135385470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:37.136331 env[1471]: time="2024-04-12T21:30:37.136317818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:37.137237 env[1471]: time="2024-04-12T21:30:37.137220630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:37.138120 env[1471]: time="2024-04-12T21:30:37.138107997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:37.138589 env[1471]: time="2024-04-12T21:30:37.138574887Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 21:30:37.139744 env[1471]: time="2024-04-12T21:30:37.139728646Z" level=info msg="CreateContainer within sandbox \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 21:30:37.145181 env[1471]: time="2024-04-12T21:30:37.145160403Z" level=info msg="CreateContainer within sandbox \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c\"" Apr 12 21:30:37.145524 env[1471]: time="2024-04-12T21:30:37.145511563Z" level=info msg="StartContainer for \"72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c\"" Apr 12 21:30:37.155312 systemd[1]: Started cri-containerd-72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c.scope. Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.190415 kernel: kauditd_printk_skb: 47 callbacks suppressed Apr 12 21:30:37.190489 kernel: audit: type=1400 audit(1712957437.161:1120): avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fedb5d2e618 items=0 ppid=3123 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:37.352942 kernel: audit: type=1300 audit(1712957437.161:1120): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fedb5d2e618 items=0 ppid=3123 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:37.352976 kernel: audit: type=1327 audit(1712957437.161:1120): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363039626466613334316537653362633336623764663230306138 Apr 12 21:30:37.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363039626466613334316537653362633336623764663230306138 Apr 12 21:30:37.446844 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.510741 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.574769 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.638687 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.702943 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.708214 env[1471]: time="2024-04-12T21:30:37.708188616Z" level=info msg="StartContainer for \"72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c\" returns successfully" Apr 12 21:30:37.767280 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.831654 kernel: audit: type=1400 audit(1712957437.161:1121): avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.161000 audit: BPF prog-id=136 op=LOAD Apr 12 21:30:37.161000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ce278 items=0 ppid=3123 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:37.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363039626466613334316537653362633336623764663230306138 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.351000 audit: BPF prog-id=137 op=LOAD Apr 12 21:30:37.351000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ce2c8 items=0 ppid=3123 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:37.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363039626466613334316537653362633336623764663230306138 Apr 12 21:30:37.509000 audit: BPF prog-id=137 op=UNLOAD Apr 12 21:30:37.509000 audit: BPF prog-id=136 op=UNLOAD Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:37.509000 audit: BPF prog-id=138 op=LOAD Apr 12 21:30:37.509000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ce358 items=0 ppid=3123 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:37.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363039626466613334316537653362633336623764663230306138 Apr 12 21:30:38.326134 env[1471]: time="2024-04-12T21:30:38.325987473Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 21:30:38.329051 systemd[1]: cri-containerd-72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c.scope: Deactivated successfully. Apr 12 21:30:38.348000 audit: BPF prog-id=138 op=UNLOAD Apr 12 21:30:38.368646 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c-rootfs.mount: Deactivated successfully. Apr 12 21:30:38.394812 kubelet[2586]: I0412 21:30:38.394760 2586 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 21:30:38.411619 systemd[1]: Created slice kubepods-besteffort-pod0dbae0a5_e3c3_44ef_ab4f_611777ecc1a4.slice. Apr 12 21:30:38.418472 env[1471]: time="2024-04-12T21:30:38.418352811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfd9,Uid:0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4,Namespace:calico-system,Attempt:0,}" Apr 12 21:30:38.436953 kubelet[2586]: I0412 21:30:38.436883 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:38.437799 kubelet[2586]: I0412 21:30:38.437722 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:38.438426 kubelet[2586]: I0412 21:30:38.438382 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:30:38.453578 systemd[1]: Created slice kubepods-burstable-podcfe30a7e_aef4_436e_b448_a3d99fe34a9e.slice. Apr 12 21:30:38.481144 systemd[1]: Created slice kubepods-besteffort-pod02155b46_f794_4bf5_abac_36b54ece36cb.slice. Apr 12 21:30:38.481834 systemd[1]: Created slice kubepods-burstable-pod99486f6b_88be_4d88_ba86_6a97830a6016.slice. Apr 12 21:30:38.518948 kubelet[2586]: I0412 21:30:38.518892 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cfe30a7e-aef4-436e-b448-a3d99fe34a9e-config-volume\") pod \"coredns-5d78c9869d-c2bcm\" (UID: \"cfe30a7e-aef4-436e-b448-a3d99fe34a9e\") " pod="kube-system/coredns-5d78c9869d-c2bcm" Apr 12 21:30:38.519295 kubelet[2586]: I0412 21:30:38.518997 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/99486f6b-88be-4d88-ba86-6a97830a6016-config-volume\") pod \"coredns-5d78c9869d-c296v\" (UID: \"99486f6b-88be-4d88-ba86-6a97830a6016\") " pod="kube-system/coredns-5d78c9869d-c296v" Apr 12 21:30:38.519295 kubelet[2586]: I0412 21:30:38.519186 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bcpmb\" (UniqueName: \"kubernetes.io/projected/99486f6b-88be-4d88-ba86-6a97830a6016-kube-api-access-bcpmb\") pod \"coredns-5d78c9869d-c296v\" (UID: \"99486f6b-88be-4d88-ba86-6a97830a6016\") " pod="kube-system/coredns-5d78c9869d-c296v" Apr 12 21:30:38.519295 kubelet[2586]: I0412 21:30:38.519269 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nxktj\" (UniqueName: \"kubernetes.io/projected/02155b46-f794-4bf5-abac-36b54ece36cb-kube-api-access-nxktj\") pod \"calico-kube-controllers-6f86bbfdb-nzxm2\" (UID: \"02155b46-f794-4bf5-abac-36b54ece36cb\") " pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" Apr 12 21:30:38.519710 kubelet[2586]: I0412 21:30:38.519669 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/02155b46-f794-4bf5-abac-36b54ece36cb-tigera-ca-bundle\") pod \"calico-kube-controllers-6f86bbfdb-nzxm2\" (UID: \"02155b46-f794-4bf5-abac-36b54ece36cb\") " pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" Apr 12 21:30:38.519853 kubelet[2586]: I0412 21:30:38.519832 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mmdbh\" (UniqueName: \"kubernetes.io/projected/cfe30a7e-aef4-436e-b448-a3d99fe34a9e-kube-api-access-mmdbh\") pod \"coredns-5d78c9869d-c2bcm\" (UID: \"cfe30a7e-aef4-436e-b448-a3d99fe34a9e\") " pod="kube-system/coredns-5d78c9869d-c2bcm" Apr 12 21:30:38.759590 env[1471]: time="2024-04-12T21:30:38.759446466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c2bcm,Uid:cfe30a7e-aef4-436e-b448-a3d99fe34a9e,Namespace:kube-system,Attempt:0,}" Apr 12 21:30:38.767987 kubelet[2586]: I0412 21:30:38.767904 2586 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:30:38.784797 env[1471]: time="2024-04-12T21:30:38.784690011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c296v,Uid:99486f6b-88be-4d88-ba86-6a97830a6016,Namespace:kube-system,Attempt:0,}" Apr 12 21:30:38.784797 env[1471]: time="2024-04-12T21:30:38.784712305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f86bbfdb-nzxm2,Uid:02155b46-f794-4bf5-abac-36b54ece36cb,Namespace:calico-system,Attempt:0,}" Apr 12 21:30:38.806000 audit[3350]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=3350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:38.806000 audit[3350]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffecdb9a8e0 a2=0 a3=7ffecdb9a8cc items=0 ppid=2812 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:38.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:38.808000 audit[3350]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:38.808000 audit[3350]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffecdb9a8e0 a2=0 a3=7ffecdb9a8cc items=0 ppid=2812 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:38.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:39.032499 env[1471]: time="2024-04-12T21:30:39.032263275Z" level=info msg="shim disconnected" id=72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c Apr 12 21:30:39.032499 env[1471]: time="2024-04-12T21:30:39.032369771Z" level=warning msg="cleaning up after shim disconnected" id=72609bdfa341e7e3bc36b7df200a85eab76834914db3eb3669a795e916abd96c namespace=k8s.io Apr 12 21:30:39.032499 env[1471]: time="2024-04-12T21:30:39.032397194Z" level=info msg="cleaning up dead shim" Apr 12 21:30:39.067093 env[1471]: time="2024-04-12T21:30:39.066987719Z" level=warning msg="cleanup warnings time=\"2024-04-12T21:30:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3358 runtime=io.containerd.runc.v2\n" Apr 12 21:30:39.114681 env[1471]: time="2024-04-12T21:30:39.114627459Z" level=error msg="Failed to destroy network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.114819 env[1471]: time="2024-04-12T21:30:39.114737999Z" level=error msg="Failed to destroy network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.114855 env[1471]: time="2024-04-12T21:30:39.114832510Z" level=error msg="Failed to destroy network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115000 env[1471]: time="2024-04-12T21:30:39.114977900Z" level=error msg="encountered an error cleaning up failed sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115036 env[1471]: time="2024-04-12T21:30:39.114989826Z" level=error msg="encountered an error cleaning up failed sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115061 env[1471]: time="2024-04-12T21:30:39.115023671Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfd9,Uid:0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115061 env[1471]: time="2024-04-12T21:30:39.115027134Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f86bbfdb-nzxm2,Uid:02155b46-f794-4bf5-abac-36b54ece36cb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115061 env[1471]: time="2024-04-12T21:30:39.115037842Z" level=error msg="encountered an error cleaning up failed sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115151 env[1471]: time="2024-04-12T21:30:39.115063089Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c296v,Uid:99486f6b-88be-4d88-ba86-6a97830a6016,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115189 kubelet[2586]: E0412 21:30:39.115178 2586 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115223 kubelet[2586]: E0412 21:30:39.115214 2586 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:39.115256 kubelet[2586]: E0412 21:30:39.115230 2586 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xxfd9" Apr 12 21:30:39.115256 kubelet[2586]: E0412 21:30:39.115178 2586 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115304 kubelet[2586]: E0412 21:30:39.115270 2586 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-c296v" Apr 12 21:30:39.115304 kubelet[2586]: E0412 21:30:39.115276 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xxfd9_calico-system(0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xxfd9_calico-system(0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:39.115304 kubelet[2586]: E0412 21:30:39.115283 2586 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-c296v" Apr 12 21:30:39.115388 kubelet[2586]: E0412 21:30:39.115178 2586 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115388 kubelet[2586]: E0412 21:30:39.115331 2586 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" Apr 12 21:30:39.115388 kubelet[2586]: E0412 21:30:39.115344 2586 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" Apr 12 21:30:39.115463 env[1471]: time="2024-04-12T21:30:39.115347228Z" level=error msg="Failed to destroy network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115489 kubelet[2586]: E0412 21:30:39.115368 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6f86bbfdb-nzxm2_calico-system(02155b46-f794-4bf5-abac-36b54ece36cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6f86bbfdb-nzxm2_calico-system(02155b46-f794-4bf5-abac-36b54ece36cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" podUID=02155b46-f794-4bf5-abac-36b54ece36cb Apr 12 21:30:39.115489 kubelet[2586]: E0412 21:30:39.115308 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-c296v_kube-system(99486f6b-88be-4d88-ba86-6a97830a6016)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-c296v_kube-system(99486f6b-88be-4d88-ba86-6a97830a6016)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-c296v" podUID=99486f6b-88be-4d88-ba86-6a97830a6016 Apr 12 21:30:39.115567 env[1471]: time="2024-04-12T21:30:39.115540918Z" level=error msg="encountered an error cleaning up failed sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115593 env[1471]: time="2024-04-12T21:30:39.115566860Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c2bcm,Uid:cfe30a7e-aef4-436e-b448-a3d99fe34a9e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115653 kubelet[2586]: E0412 21:30:39.115644 2586 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.115685 kubelet[2586]: E0412 21:30:39.115664 2586 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-c2bcm" Apr 12 21:30:39.115685 kubelet[2586]: E0412 21:30:39.115677 2586 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-c2bcm" Apr 12 21:30:39.115729 kubelet[2586]: E0412 21:30:39.115702 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-c2bcm_kube-system(cfe30a7e-aef4-436e-b448-a3d99fe34a9e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-c2bcm_kube-system(cfe30a7e-aef4-436e-b448-a3d99fe34a9e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-c2bcm" podUID=cfe30a7e-aef4-436e-b448-a3d99fe34a9e Apr 12 21:30:39.369515 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600-shm.mount: Deactivated successfully. Apr 12 21:30:39.490547 kubelet[2586]: I0412 21:30:39.490448 2586 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:30:39.491757 env[1471]: time="2024-04-12T21:30:39.491676104Z" level=info msg="StopPodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\"" Apr 12 21:30:39.492842 kubelet[2586]: I0412 21:30:39.492783 2586 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:30:39.494055 env[1471]: time="2024-04-12T21:30:39.493935141Z" level=info msg="StopPodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\"" Apr 12 21:30:39.497254 kubelet[2586]: I0412 21:30:39.497236 2586 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:30:39.497361 env[1471]: time="2024-04-12T21:30:39.497243370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 21:30:39.497491 env[1471]: time="2024-04-12T21:30:39.497477625Z" level=info msg="StopPodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\"" Apr 12 21:30:39.497743 kubelet[2586]: I0412 21:30:39.497731 2586 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:30:39.498090 env[1471]: time="2024-04-12T21:30:39.498069966Z" level=info msg="StopPodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\"" Apr 12 21:30:39.509368 env[1471]: time="2024-04-12T21:30:39.509294493Z" level=error msg="StopPodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" failed" error="failed to destroy network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.509552 kubelet[2586]: E0412 21:30:39.509509 2586 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:30:39.509552 kubelet[2586]: E0412 21:30:39.509550 2586 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708} Apr 12 21:30:39.509630 kubelet[2586]: E0412 21:30:39.509587 2586 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"02155b46-f794-4bf5-abac-36b54ece36cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:30:39.509630 kubelet[2586]: E0412 21:30:39.509614 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"02155b46-f794-4bf5-abac-36b54ece36cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" podUID=02155b46-f794-4bf5-abac-36b54ece36cb Apr 12 21:30:39.510776 env[1471]: time="2024-04-12T21:30:39.510725977Z" level=error msg="StopPodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" failed" error="failed to destroy network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.510884 kubelet[2586]: E0412 21:30:39.510844 2586 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:30:39.510884 kubelet[2586]: E0412 21:30:39.510863 2586 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600} Apr 12 21:30:39.510884 kubelet[2586]: E0412 21:30:39.510883 2586 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:30:39.510969 kubelet[2586]: E0412 21:30:39.510898 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xxfd9" podUID=0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 Apr 12 21:30:39.511666 env[1471]: time="2024-04-12T21:30:39.511618475Z" level=error msg="StopPodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" failed" error="failed to destroy network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.511758 kubelet[2586]: E0412 21:30:39.511721 2586 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:30:39.511758 kubelet[2586]: E0412 21:30:39.511734 2586 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf} Apr 12 21:30:39.511758 kubelet[2586]: E0412 21:30:39.511754 2586 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"99486f6b-88be-4d88-ba86-6a97830a6016\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:30:39.511856 kubelet[2586]: E0412 21:30:39.511768 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"99486f6b-88be-4d88-ba86-6a97830a6016\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-c296v" podUID=99486f6b-88be-4d88-ba86-6a97830a6016 Apr 12 21:30:39.512546 env[1471]: time="2024-04-12T21:30:39.512498454Z" level=error msg="StopPodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" failed" error="failed to destroy network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:30:39.512637 kubelet[2586]: E0412 21:30:39.512601 2586 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:30:39.512637 kubelet[2586]: E0412 21:30:39.512614 2586 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b} Apr 12 21:30:39.512637 kubelet[2586]: E0412 21:30:39.512631 2586 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cfe30a7e-aef4-436e-b448-a3d99fe34a9e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:30:39.512732 kubelet[2586]: E0412 21:30:39.512647 2586 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cfe30a7e-aef4-436e-b448-a3d99fe34a9e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-c2bcm" podUID=cfe30a7e-aef4-436e-b448-a3d99fe34a9e Apr 12 21:30:45.493400 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount610868083.mount: Deactivated successfully. Apr 12 21:30:45.516761 env[1471]: time="2024-04-12T21:30:45.516711399Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:45.517321 env[1471]: time="2024-04-12T21:30:45.517267640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:45.517919 env[1471]: time="2024-04-12T21:30:45.517880210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:45.518524 env[1471]: time="2024-04-12T21:30:45.518478443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:45.518818 env[1471]: time="2024-04-12T21:30:45.518773921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 21:30:45.522716 env[1471]: time="2024-04-12T21:30:45.522666652Z" level=info msg="CreateContainer within sandbox \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 21:30:45.528737 env[1471]: time="2024-04-12T21:30:45.528693547Z" level=info msg="CreateContainer within sandbox \"9e11830649226ef22403e9581ed79b4c205b8e2396a2963d58c612f9944b63c3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"081462d93315c92fbc047f6a1ad0a4394c01739ad60166d3b721eeec1461a16d\"" Apr 12 21:30:45.529068 env[1471]: time="2024-04-12T21:30:45.528997941Z" level=info msg="StartContainer for \"081462d93315c92fbc047f6a1ad0a4394c01739ad60166d3b721eeec1461a16d\"" Apr 12 21:30:45.537570 systemd[1]: Started cri-containerd-081462d93315c92fbc047f6a1ad0a4394c01739ad60166d3b721eeec1461a16d.scope. Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.574059 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 21:30:45.574121 kernel: audit: type=1400 audit(1712957445.545:1129): avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f476826d688 items=0 ppid=3123 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:45.639293 kernel: audit: type=1300 audit(1712957445.545:1129): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f476826d688 items=0 ppid=3123 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:45.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313436326439333331356339326662633034376636613161643061 Apr 12 21:30:45.832356 kernel: audit: type=1327 audit(1712957445.545:1129): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313436326439333331356339326662633034376636613161643061 Apr 12 21:30:45.832395 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.896311 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.960312 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:46.024313 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:46.088819 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:46.153228 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:46.158594 env[1471]: time="2024-04-12T21:30:46.158545019Z" level=info msg="StartContainer for \"081462d93315c92fbc047f6a1ad0a4394c01739ad60166d3b721eeec1461a16d\" returns successfully" Apr 12 21:30:46.217668 kernel: audit: type=1400 audit(1712957445.545:1130): avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.545000 audit: BPF prog-id=139 op=LOAD Apr 12 21:30:45.545000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000212c58 items=0 ppid=3123 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:45.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313436326439333331356339326662633034376636613161643061 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.735000 audit: BPF prog-id=140 op=LOAD Apr 12 21:30:45.735000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000212ca8 items=0 ppid=3123 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:45.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313436326439333331356339326662633034376636613161643061 Apr 12 21:30:45.895000 audit: BPF prog-id=140 op=UNLOAD Apr 12 21:30:45.895000 audit: BPF prog-id=139 op=UNLOAD Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { perfmon } for pid=3700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit[3700]: AVC avc: denied { bpf } for pid=3700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:45.895000 audit: BPF prog-id=141 op=LOAD Apr 12 21:30:45.895000 audit[3700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000212d38 items=0 ppid=3123 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:45.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038313436326439333331356339326662633034376636613161643061 Apr 12 21:30:46.367115 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 21:30:46.367158 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 21:30:46.528655 kubelet[2586]: I0412 21:30:46.528625 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-x84cb" podStartSLOduration=2.39337238 podCreationTimestamp="2024-04-12 21:30:24 +0000 UTC" firstStartedPulling="2024-04-12 21:30:25.383662081 +0000 UTC m=+20.086139028" lastFinishedPulling="2024-04-12 21:30:45.518872317 +0000 UTC m=+40.221349261" observedRunningTime="2024-04-12 21:30:46.52785298 +0000 UTC m=+41.230329950" watchObservedRunningTime="2024-04-12 21:30:46.528582613 +0000 UTC m=+41.231059571" Apr 12 21:30:47.611000 audit[3881]: AVC avc: denied { write } for pid=3881 comm="tee" name="fd" dev="proc" ino=39027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit[3881]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1078896d a2=241 a3=1b6 items=1 ppid=3844 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=16266 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.611000 audit[3880]: AVC avc: denied { write } for pid=3880 comm="tee" name="fd" dev="proc" ino=19170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit[3880]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc60f1d96f a2=241 a3=1b6 items=1 ppid=3843 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 21:30:47.611000 audit[3878]: AVC avc: denied { write } for pid=3878 comm="tee" name="fd" dev="proc" ino=33446 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit[3876]: AVC avc: denied { write } for pid=3876 comm="tee" name="fd" dev="proc" ino=31411 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=19167 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.611000 audit[3876]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1029295d a2=241 a3=1b6 items=1 ppid=3840 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit[3878]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe59e5096d a2=241 a3=1b6 items=1 ppid=3842 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=31408 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=33443 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.611000 audit[3885]: AVC avc: denied { write } for pid=3885 comm="tee" name="fd" dev="proc" ino=28524 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit[3877]: AVC avc: denied { write } for pid=3877 comm="tee" name="fd" dev="proc" ino=35109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit[3885]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffef95b96e a2=241 a3=1b6 items=1 ppid=3839 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=28521 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit[3877]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6642295e a2=241 a3=1b6 items=1 ppid=3841 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=39024 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.611000 audit[3886]: AVC avc: denied { write } for pid=3886 comm="tee" name="fd" dev="proc" ino=37197 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:30:47.611000 audit[3886]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde6c3996d a2=241 a3=1b6 items=1 ppid=3846 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.611000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 21:30:47.611000 audit: PATH item=0 name="/dev/fd/63" inode=37194 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:30:47.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit: BPF prog-id=142 op=LOAD Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca35be140 a2=70 a3=7fd5d9f50000 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit: BPF prog-id=142 op=UNLOAD Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit: BPF prog-id=143 op=LOAD Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca35be140 a2=70 a3=6f items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit: BPF prog-id=143 op=UNLOAD Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca35be0f0 a2=70 a3=7ffca35be140 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit: BPF prog-id=144 op=LOAD Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffca35be0d0 a2=70 a3=7ffca35be140 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit: BPF prog-id=144 op=UNLOAD Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca35be1b0 a2=70 a3=0 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca35be1a0 a2=70 a3=0 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca35be110 a2=70 a3=0 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffca35be1e0 a2=70 a3=8eee10 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca35be1e0 a2=70 a3=8eb880 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.698000 audit: BPF prog-id=145 op=LOAD Apr 12 21:30:47.698000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca35be100 a2=70 a3=0 items=0 ppid=3852 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:30:47.700000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.700000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb876c5f0 a2=70 a3=fff80800 items=0 ppid=3852 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 21:30:47.700000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:47.700000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb876c4c0 a2=70 a3=3 items=0 ppid=3852 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 21:30:47.716000 audit: BPF prog-id=145 op=UNLOAD Apr 12 21:30:47.762000 audit[4071]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:47.762000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe0fa7fe80 a2=0 a3=7ffe0fa7fe6c items=0 ppid=3852 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.762000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:47.766000 audit[4070]: NETFILTER_CFG table=raw:96 family=2 entries=19 op=nft_register_chain pid=4070 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:47.766000 audit[4070]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc6124eb80 a2=0 a3=7ffc6124eb6c items=0 ppid=3852 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.766000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:47.769000 audit[4075]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:47.769000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc4230e480 a2=0 a3=7ffc4230e46c items=0 ppid=3852 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.769000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:47.771000 audit[4073]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:47.771000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffec5fdbe30 a2=0 a3=7ffec5fdbe1c items=0 ppid=3852 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:47.771000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:48.676540 systemd-networkd[1325]: vxlan.calico: Link UP Apr 12 21:30:48.676544 systemd-networkd[1325]: vxlan.calico: Gained carrier Apr 12 21:30:50.168524 systemd-networkd[1325]: vxlan.calico: Gained IPv6LL Apr 12 21:30:50.401736 env[1471]: time="2024-04-12T21:30:50.401636405Z" level=info msg="StopPodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\"" Apr 12 21:30:50.402571 env[1471]: time="2024-04-12T21:30:50.401714235Z" level=info msg="StopPodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\"" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.472 [INFO][4120] k8s.go 585: Cleaning up netns ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.472 [INFO][4120] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" iface="eth0" netns="/var/run/netns/cni-615c2da9-f7d0-693a-1f72-6c0df6db5bea" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.472 [INFO][4120] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" iface="eth0" netns="/var/run/netns/cni-615c2da9-f7d0-693a-1f72-6c0df6db5bea" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.472 [INFO][4120] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" iface="eth0" netns="/var/run/netns/cni-615c2da9-f7d0-693a-1f72-6c0df6db5bea" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.472 [INFO][4120] k8s.go 592: Releasing IP address(es) ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.472 [INFO][4120] utils.go 188: Calico CNI releasing IP address ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.494 [INFO][4156] ipam_plugin.go 415: Releasing address using handleID ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.494 [INFO][4156] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.494 [INFO][4156] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.502 [WARNING][4156] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.502 [INFO][4156] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.504 [INFO][4156] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:50.506630 env[1471]: 2024-04-12 21:30:50.505 [INFO][4120] k8s.go 598: Teardown processing complete. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:30:50.507276 env[1471]: time="2024-04-12T21:30:50.506711011Z" level=info msg="TearDown network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" successfully" Apr 12 21:30:50.507276 env[1471]: time="2024-04-12T21:30:50.506759033Z" level=info msg="StopPodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" returns successfully" Apr 12 21:30:50.507537 env[1471]: time="2024-04-12T21:30:50.507468195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f86bbfdb-nzxm2,Uid:02155b46-f794-4bf5-abac-36b54ece36cb,Namespace:calico-system,Attempt:1,}" Apr 12 21:30:50.509646 systemd[1]: run-netns-cni\x2d615c2da9\x2df7d0\x2d693a\x2d1f72\x2d6c0df6db5bea.mount: Deactivated successfully. Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.473 [INFO][4121] k8s.go 585: Cleaning up netns ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.473 [INFO][4121] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" iface="eth0" netns="/var/run/netns/cni-009c21ee-4235-0896-3ee4-852c7c56dfc0" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.473 [INFO][4121] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" iface="eth0" netns="/var/run/netns/cni-009c21ee-4235-0896-3ee4-852c7c56dfc0" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.473 [INFO][4121] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" iface="eth0" netns="/var/run/netns/cni-009c21ee-4235-0896-3ee4-852c7c56dfc0" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.473 [INFO][4121] k8s.go 592: Releasing IP address(es) ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.473 [INFO][4121] utils.go 188: Calico CNI releasing IP address ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.494 [INFO][4157] ipam_plugin.go 415: Releasing address using handleID ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.494 [INFO][4157] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.504 [INFO][4157] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.512 [WARNING][4157] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.512 [INFO][4157] ipam_plugin.go 443: Releasing address using workloadID ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.514 [INFO][4157] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:50.519242 env[1471]: 2024-04-12 21:30:50.517 [INFO][4121] k8s.go 598: Teardown processing complete. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:30:50.520187 env[1471]: time="2024-04-12T21:30:50.519401133Z" level=info msg="TearDown network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" successfully" Apr 12 21:30:50.520187 env[1471]: time="2024-04-12T21:30:50.519452134Z" level=info msg="StopPodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" returns successfully" Apr 12 21:30:50.520187 env[1471]: time="2024-04-12T21:30:50.520131034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c296v,Uid:99486f6b-88be-4d88-ba86-6a97830a6016,Namespace:kube-system,Attempt:1,}" Apr 12 21:30:50.522526 systemd[1]: run-netns-cni\x2d009c21ee\x2d4235\x2d0896\x2d3ee4\x2d852c7c56dfc0.mount: Deactivated successfully. Apr 12 21:30:50.590637 systemd-networkd[1325]: cali9d1ee32028e: Link UP Apr 12 21:30:50.647066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:30:50.647137 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9d1ee32028e: link becomes ready Apr 12 21:30:50.647139 systemd-networkd[1325]: cali9d1ee32028e: Gained carrier Apr 12 21:30:50.647729 systemd-networkd[1325]: cali267400a54c3: Link UP Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.549 [INFO][4206] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0 coredns-5d78c9869d- kube-system 99486f6b-88be-4d88-ba86-6a97830a6016 669 0 2024-04-12 21:30:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-97ccf21113 coredns-5d78c9869d-c296v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9d1ee32028e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.549 [INFO][4206] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.565 [INFO][4242] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" HandleID="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.571 [INFO][4242] ipam_plugin.go 268: Auto assigning IP ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" HandleID="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a0a40), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-97ccf21113", "pod":"coredns-5d78c9869d-c296v", "timestamp":"2024-04-12 21:30:50.565356891 +0000 UTC"}, Hostname:"ci-3510.3.3-a-97ccf21113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.571 [INFO][4242] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.571 [INFO][4242] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.571 [INFO][4242] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-97ccf21113' Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.573 [INFO][4242] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.576 [INFO][4242] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.578 [INFO][4242] ipam.go 489: Trying affinity for 192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.580 [INFO][4242] ipam.go 155: Attempting to load block cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.582 [INFO][4242] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.582 [INFO][4242] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.192/26 handle="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.583 [INFO][4242] ipam.go 1682: Creating new handle: k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6 Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.585 [INFO][4242] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.192/26 handle="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.588 [INFO][4242] ipam.go 1216: Successfully claimed IPs: [192.168.30.193/26] block=192.168.30.192/26 handle="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.588 [INFO][4242] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.193/26] handle="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.588 [INFO][4242] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:50.655277 env[1471]: 2024-04-12 21:30:50.588 [INFO][4242] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.193/26] IPv6=[] ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" HandleID="k8s-pod-network.108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.655747 env[1471]: 2024-04-12 21:30:50.589 [INFO][4206] k8s.go 385: Populated endpoint ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"99486f6b-88be-4d88-ba86-6a97830a6016", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"", Pod:"coredns-5d78c9869d-c296v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d1ee32028e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:50.655747 env[1471]: 2024-04-12 21:30:50.589 [INFO][4206] k8s.go 386: Calico CNI using IPs: [192.168.30.193/32] ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.655747 env[1471]: 2024-04-12 21:30:50.589 [INFO][4206] dataplane_linux.go 68: Setting the host side veth name to cali9d1ee32028e ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.655747 env[1471]: 2024-04-12 21:30:50.647 [INFO][4206] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.655747 env[1471]: 2024-04-12 21:30:50.647 [INFO][4206] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"99486f6b-88be-4d88-ba86-6a97830a6016", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6", Pod:"coredns-5d78c9869d-c296v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d1ee32028e", MAC:"a6:b1:61:69:5a:16", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:50.655747 env[1471]: 2024-04-12 21:30:50.651 [INFO][4206] k8s.go 498: Wrote updated endpoint to datastore ContainerID="108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6" Namespace="kube-system" Pod="coredns-5d78c9869d-c296v" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:30:50.657000 audit[4287]: NETFILTER_CFG table=filter:99 family=2 entries=36 op=nft_register_chain pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:50.660681 env[1471]: time="2024-04-12T21:30:50.660624284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:50.660681 env[1471]: time="2024-04-12T21:30:50.660644235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:50.660681 env[1471]: time="2024-04-12T21:30:50.660651014Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:50.660783 env[1471]: time="2024-04-12T21:30:50.660715054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6 pid=4294 runtime=io.containerd.runc.v2 Apr 12 21:30:50.665989 systemd[1]: Started cri-containerd-108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6.scope. Apr 12 21:30:50.675968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali267400a54c3: link becomes ready Apr 12 21:30:50.676003 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 21:30:50.676017 kernel: audit: type=1325 audit(1712957450.657:1162): table=filter:99 family=2 entries=36 op=nft_register_chain pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:50.676464 systemd-networkd[1325]: cali267400a54c3: Gained carrier Apr 12 21:30:50.657000 audit[4287]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffc7fabf700 a2=0 a3=7ffc7fabf6ec items=0 ppid=3852 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:50.760266 kernel: audit: type=1300 audit(1712957450.657:1162): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffc7fabf700 a2=0 a3=7ffc7fabf6ec items=0 ppid=3852 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:50.657000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.544 [INFO][4191] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0 calico-kube-controllers-6f86bbfdb- calico-system 02155b46-f794-4bf5-abac-36b54ece36cb 668 0 2024-04-12 21:30:24 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6f86bbfdb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-97ccf21113 calico-kube-controllers-6f86bbfdb-nzxm2 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali267400a54c3 [] []}} ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.544 [INFO][4191] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.563 [INFO][4237] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" HandleID="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.571 [INFO][4237] ipam_plugin.go 268: Auto assigning IP ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" HandleID="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a6bb0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-97ccf21113", "pod":"calico-kube-controllers-6f86bbfdb-nzxm2", "timestamp":"2024-04-12 21:30:50.563018755 +0000 UTC"}, Hostname:"ci-3510.3.3-a-97ccf21113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.571 [INFO][4237] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.588 [INFO][4237] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.588 [INFO][4237] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-97ccf21113' Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.590 [INFO][4237] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.620 [INFO][4237] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.622 [INFO][4237] ipam.go 489: Trying affinity for 192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.624 [INFO][4237] ipam.go 155: Attempting to load block cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.625 [INFO][4237] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.625 [INFO][4237] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.192/26 handle="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.626 [INFO][4237] ipam.go 1682: Creating new handle: k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263 Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.628 [INFO][4237] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.192/26 handle="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.631 [INFO][4237] ipam.go 1216: Successfully claimed IPs: [192.168.30.194/26] block=192.168.30.192/26 handle="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.631 [INFO][4237] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.194/26] handle="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.631 [INFO][4237] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:50.863866 env[1471]: 2024-04-12 21:30:50.631 [INFO][4237] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.194/26] IPv6=[] ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" HandleID="k8s-pod-network.dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.864541 env[1471]: 2024-04-12 21:30:50.632 [INFO][4191] k8s.go 385: Populated endpoint ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0", GenerateName:"calico-kube-controllers-6f86bbfdb-", Namespace:"calico-system", SelfLink:"", UID:"02155b46-f794-4bf5-abac-36b54ece36cb", ResourceVersion:"668", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f86bbfdb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"", Pod:"calico-kube-controllers-6f86bbfdb-nzxm2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.30.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali267400a54c3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:50.864541 env[1471]: 2024-04-12 21:30:50.632 [INFO][4191] k8s.go 386: Calico CNI using IPs: [192.168.30.194/32] ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.864541 env[1471]: 2024-04-12 21:30:50.632 [INFO][4191] dataplane_linux.go 68: Setting the host side veth name to cali267400a54c3 ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.864541 env[1471]: 2024-04-12 21:30:50.647 [INFO][4191] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.864541 env[1471]: 2024-04-12 21:30:50.858 [INFO][4191] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0", GenerateName:"calico-kube-controllers-6f86bbfdb-", Namespace:"calico-system", SelfLink:"", UID:"02155b46-f794-4bf5-abac-36b54ece36cb", ResourceVersion:"668", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f86bbfdb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263", Pod:"calico-kube-controllers-6f86bbfdb-nzxm2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.30.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali267400a54c3", MAC:"12:15:12:13:f5:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:50.864541 env[1471]: 2024-04-12 21:30:50.862 [INFO][4191] k8s.go 498: Wrote updated endpoint to datastore ContainerID="dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263" Namespace="calico-system" Pod="calico-kube-controllers-6f86bbfdb-nzxm2" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:30:50.869400 env[1471]: time="2024-04-12T21:30:50.869307363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:50.869400 env[1471]: time="2024-04-12T21:30:50.869354268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:50.869400 env[1471]: time="2024-04-12T21:30:50.869370487Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:50.869580 env[1471]: time="2024-04-12T21:30:50.869449900Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263 pid=4339 runtime=io.containerd.runc.v2 Apr 12 21:30:50.914895 kernel: audit: type=1327 audit(1712957450.657:1162): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:50.914968 kernel: audit: type=1400 audit(1712957450.765:1163): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.916215 systemd[1]: Started cri-containerd-dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263.scope. Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.038733 kernel: audit: type=1400 audit(1712957450.765:1164): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.038831 kernel: audit: type=1400 audit(1712957450.765:1165): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.162824 kernel: audit: type=1400 audit(1712957450.765:1166): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.162854 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:30:51.162874 kernel: audit: type=1400 audit(1712957450.765:1167): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.189243 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.869000 audit[4349]: NETFILTER_CFG table=filter:100 family=2 entries=40 op=nft_register_chain pid=4349 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:50.869000 audit[4349]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7fff315be2b0 a2=0 a3=7fff315be29c items=0 ppid=3852 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:50.869000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:50.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.913000 audit: BPF prog-id=146 op=LOAD Apr 12 21:30:50.913000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.913000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4294 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:50.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130386333663735346339373636386635653332353031633162353939 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4294 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130386333663735346339373636386635653332353031633162353939 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:50.914000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit: BPF prog-id=147 op=LOAD Apr 12 21:30:50.914000 audit: BPF prog-id=148 op=LOAD Apr 12 21:30:50.914000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002de9d0 items=0 ppid=4294 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:50.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130386333663735346339373636386635653332353031633162353939 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4339 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396561353735396537373861306465356365633530323538636532 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4339 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396561353735396537373861306465356365633530323538636532 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit: BPF prog-id=150 op=LOAD Apr 12 21:30:51.099000 audit[4350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000354470 items=0 ppid=4339 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396561353735396537373861306465356365633530323538636532 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.099000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002dea18 items=0 ppid=4294 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130386333663735346339373636386635653332353031633162353939 Apr 12 21:30:51.275000 audit: BPF prog-id=149 op=UNLOAD Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit: BPF prog-id=151 op=LOAD Apr 12 21:30:51.275000 audit: BPF prog-id=148 op=UNLOAD Apr 12 21:30:51.275000 audit[4350]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003544b8 items=0 ppid=4339 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396561353735396537373861306465356365633530323538636532 Apr 12 21:30:51.275000 audit: BPF prog-id=151 op=UNLOAD Apr 12 21:30:51.275000 audit: BPF prog-id=150 op=UNLOAD Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit: BPF prog-id=152 op=LOAD Apr 12 21:30:51.275000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002dee28 items=0 ppid=4294 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130386333663735346339373636386635653332353031633162353939 Apr 12 21:30:51.275000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.275000 audit: BPF prog-id=153 op=LOAD Apr 12 21:30:51.275000 audit[4350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003548c8 items=0 ppid=4339 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396561353735396537373861306465356365633530323538636532 Apr 12 21:30:51.292897 env[1471]: time="2024-04-12T21:30:51.292833049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c296v,Uid:99486f6b-88be-4d88-ba86-6a97830a6016,Namespace:kube-system,Attempt:1,} returns sandbox id \"108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6\"" Apr 12 21:30:51.293031 env[1471]: time="2024-04-12T21:30:51.293013337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f86bbfdb-nzxm2,Uid:02155b46-f794-4bf5-abac-36b54ece36cb,Namespace:calico-system,Attempt:1,} returns sandbox id \"dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263\"" Apr 12 21:30:51.293667 env[1471]: time="2024-04-12T21:30:51.293652337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 21:30:51.294163 env[1471]: time="2024-04-12T21:30:51.294148864Z" level=info msg="CreateContainer within sandbox \"108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 21:30:51.299328 env[1471]: time="2024-04-12T21:30:51.299278413Z" level=info msg="CreateContainer within sandbox \"108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"45dd6b46ac8df6516992ae56a3a6d7ce34aa9f02d36836bed8d9dea81863f600\"" Apr 12 21:30:51.299514 env[1471]: time="2024-04-12T21:30:51.299499994Z" level=info msg="StartContainer for \"45dd6b46ac8df6516992ae56a3a6d7ce34aa9f02d36836bed8d9dea81863f600\"" Apr 12 21:30:51.306709 systemd[1]: Started cri-containerd-45dd6b46ac8df6516992ae56a3a6d7ce34aa9f02d36836bed8d9dea81863f600.scope. Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit: BPF prog-id=154 op=LOAD Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4294 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646436623436616338646636353136393932616535366133613664 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4294 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646436623436616338646636353136393932616535366133613664 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.311000 audit: BPF prog-id=155 op=LOAD Apr 12 21:30:51.311000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003089f0 items=0 ppid=4294 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646436623436616338646636353136393932616535366133613664 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit: BPF prog-id=156 op=LOAD Apr 12 21:30:51.312000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000308a38 items=0 ppid=4294 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646436623436616338646636353136393932616535366133613664 Apr 12 21:30:51.312000 audit: BPF prog-id=156 op=UNLOAD Apr 12 21:30:51.312000 audit: BPF prog-id=155 op=UNLOAD Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { perfmon } for pid=4394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit[4394]: AVC avc: denied { bpf } for pid=4394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.312000 audit: BPF prog-id=157 op=LOAD Apr 12 21:30:51.312000 audit[4394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000308e48 items=0 ppid=4294 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646436623436616338646636353136393932616535366133613664 Apr 12 21:30:51.318852 env[1471]: time="2024-04-12T21:30:51.318803178Z" level=info msg="StartContainer for \"45dd6b46ac8df6516992ae56a3a6d7ce34aa9f02d36836bed8d9dea81863f600\" returns successfully" Apr 12 21:30:51.401286 env[1471]: time="2024-04-12T21:30:51.401188661Z" level=info msg="StopPodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\"" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.472 [INFO][4450] k8s.go 585: Cleaning up netns ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.472 [INFO][4450] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" iface="eth0" netns="/var/run/netns/cni-1b64d37c-5871-a5a2-6fa1-82256a3db7ed" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.472 [INFO][4450] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" iface="eth0" netns="/var/run/netns/cni-1b64d37c-5871-a5a2-6fa1-82256a3db7ed" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.472 [INFO][4450] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" iface="eth0" netns="/var/run/netns/cni-1b64d37c-5871-a5a2-6fa1-82256a3db7ed" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.472 [INFO][4450] k8s.go 592: Releasing IP address(es) ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.472 [INFO][4450] utils.go 188: Calico CNI releasing IP address ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.493 [INFO][4469] ipam_plugin.go 415: Releasing address using handleID ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.493 [INFO][4469] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.493 [INFO][4469] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.500 [WARNING][4469] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.500 [INFO][4469] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.502 [INFO][4469] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:51.504988 env[1471]: 2024-04-12 21:30:51.503 [INFO][4450] k8s.go 598: Teardown processing complete. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:30:51.505857 env[1471]: time="2024-04-12T21:30:51.505115655Z" level=info msg="TearDown network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" successfully" Apr 12 21:30:51.505857 env[1471]: time="2024-04-12T21:30:51.505150953Z" level=info msg="StopPodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" returns successfully" Apr 12 21:30:51.505857 env[1471]: time="2024-04-12T21:30:51.505722262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfd9,Uid:0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4,Namespace:calico-system,Attempt:1,}" Apr 12 21:30:51.512058 systemd[1]: run-netns-cni\x2d1b64d37c\x2d5871\x2da5a2\x2d6fa1\x2d82256a3db7ed.mount: Deactivated successfully. Apr 12 21:30:51.539695 kubelet[2586]: I0412 21:30:51.539664 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-c296v" podStartSLOduration=32.539622556 podCreationTimestamp="2024-04-12 21:30:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:30:51.539103673 +0000 UTC m=+46.241580650" watchObservedRunningTime="2024-04-12 21:30:51.539622556 +0000 UTC m=+46.242099514" Apr 12 21:30:51.548000 audit[4512]: NETFILTER_CFG table=filter:101 family=2 entries=14 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:51.548000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffccf496710 a2=0 a3=7ffccf4966fc items=0 ppid=2812 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:51.562000 audit[4512]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:51.562000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffccf496710 a2=0 a3=0 items=0 ppid=2812 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:51.585000 audit[4530]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:51.585000 audit[4530]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd990d5090 a2=0 a3=7ffd990d507c items=0 ppid=2812 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:51.605000 audit[4530]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:51.605000 audit[4530]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd990d5090 a2=0 a3=7ffd990d507c items=0 ppid=2812 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:51.610667 systemd-networkd[1325]: calib78a3e1a6a2: Link UP Apr 12 21:30:51.664650 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:30:51.664690 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib78a3e1a6a2: link becomes ready Apr 12 21:30:51.664816 systemd-networkd[1325]: calib78a3e1a6a2: Gained carrier Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.544 [INFO][4488] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0 csi-node-driver- calico-system 0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4 681 0 2024-04-12 21:30:24 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-97ccf21113 csi-node-driver-xxfd9 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib78a3e1a6a2 [] []}} ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.544 [INFO][4488] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.573 [INFO][4513] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" HandleID="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.583 [INFO][4513] ipam_plugin.go 268: Auto assigning IP ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" HandleID="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bc620), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-97ccf21113", "pod":"csi-node-driver-xxfd9", "timestamp":"2024-04-12 21:30:51.573801968 +0000 UTC"}, Hostname:"ci-3510.3.3-a-97ccf21113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.583 [INFO][4513] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.583 [INFO][4513] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.583 [INFO][4513] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-97ccf21113' Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.585 [INFO][4513] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.589 [INFO][4513] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.593 [INFO][4513] ipam.go 489: Trying affinity for 192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.595 [INFO][4513] ipam.go 155: Attempting to load block cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.598 [INFO][4513] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.598 [INFO][4513] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.192/26 handle="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.599 [INFO][4513] ipam.go 1682: Creating new handle: k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.603 [INFO][4513] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.192/26 handle="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.607 [INFO][4513] ipam.go 1216: Successfully claimed IPs: [192.168.30.195/26] block=192.168.30.192/26 handle="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.607 [INFO][4513] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.195/26] handle="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.607 [INFO][4513] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:51.683153 env[1471]: 2024-04-12 21:30:51.607 [INFO][4513] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.195/26] IPv6=[] ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" HandleID="k8s-pod-network.15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.683860 env[1471]: 2024-04-12 21:30:51.609 [INFO][4488] k8s.go 385: Populated endpoint ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4", ResourceVersion:"681", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"", Pod:"csi-node-driver-xxfd9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib78a3e1a6a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:51.683860 env[1471]: 2024-04-12 21:30:51.609 [INFO][4488] k8s.go 386: Calico CNI using IPs: [192.168.30.195/32] ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.683860 env[1471]: 2024-04-12 21:30:51.609 [INFO][4488] dataplane_linux.go 68: Setting the host side veth name to calib78a3e1a6a2 ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.683860 env[1471]: 2024-04-12 21:30:51.664 [INFO][4488] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.683860 env[1471]: 2024-04-12 21:30:51.664 [INFO][4488] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4", ResourceVersion:"681", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e", Pod:"csi-node-driver-xxfd9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib78a3e1a6a2", MAC:"ca:de:64:b3:50:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:51.683860 env[1471]: 2024-04-12 21:30:51.681 [INFO][4488] k8s.go 498: Wrote updated endpoint to datastore ContainerID="15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e" Namespace="calico-system" Pod="csi-node-driver-xxfd9" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:30:51.688380 env[1471]: time="2024-04-12T21:30:51.688349769Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:51.688380 env[1471]: time="2024-04-12T21:30:51.688370100Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:51.688380 env[1471]: time="2024-04-12T21:30:51.688377107Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:51.688501 env[1471]: time="2024-04-12T21:30:51.688455860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e pid=4553 runtime=io.containerd.runc.v2 Apr 12 21:30:51.687000 audit[4554]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:51.687000 audit[4554]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffc69a706d0 a2=0 a3=7ffc69a706bc items=0 ppid=3852 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.687000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:51.696030 systemd[1]: Started cri-containerd-15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e.scope. Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit: BPF prog-id=158 op=LOAD Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4553 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135373434643931363164303831306135666133313937393638346435 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4553 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135373434643931363164303831306135666133313937393638346435 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit: BPF prog-id=159 op=LOAD Apr 12 21:30:51.699000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000255d0 items=0 ppid=4553 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135373434643931363164303831306135666133313937393638346435 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.699000 audit: BPF prog-id=160 op=LOAD Apr 12 21:30:51.699000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025618 items=0 ppid=4553 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135373434643931363164303831306135666133313937393638346435 Apr 12 21:30:51.699000 audit: BPF prog-id=160 op=UNLOAD Apr 12 21:30:51.700000 audit: BPF prog-id=159 op=UNLOAD Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:51.700000 audit: BPF prog-id=161 op=LOAD Apr 12 21:30:51.700000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025a28 items=0 ppid=4553 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:51.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135373434643931363164303831306135666133313937393638346435 Apr 12 21:30:51.704294 systemd-networkd[1325]: cali9d1ee32028e: Gained IPv6LL Apr 12 21:30:51.705878 env[1471]: time="2024-04-12T21:30:51.705856763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfd9,Uid:0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4,Namespace:calico-system,Attempt:1,} returns sandbox id \"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e\"" Apr 12 21:30:52.536522 systemd-networkd[1325]: cali267400a54c3: Gained IPv6LL Apr 12 21:30:53.623320 systemd-networkd[1325]: calib78a3e1a6a2: Gained IPv6LL Apr 12 21:30:54.495669 env[1471]: time="2024-04-12T21:30:54.495615447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:54.496275 env[1471]: time="2024-04-12T21:30:54.496232912Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:54.497361 env[1471]: time="2024-04-12T21:30:54.497320866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:54.498726 env[1471]: time="2024-04-12T21:30:54.498683585Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:54.499090 env[1471]: time="2024-04-12T21:30:54.499048066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 21:30:54.499613 env[1471]: time="2024-04-12T21:30:54.499600605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 21:30:54.503362 env[1471]: time="2024-04-12T21:30:54.503347697Z" level=info msg="CreateContainer within sandbox \"dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 21:30:54.508280 env[1471]: time="2024-04-12T21:30:54.508225876Z" level=info msg="CreateContainer within sandbox \"dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"8b005e2d12ffc4c7e290fd796e8399a44f3d73e79e8b6065ae9f200bc8e92869\"" Apr 12 21:30:54.508697 env[1471]: time="2024-04-12T21:30:54.508619633Z" level=info msg="StartContainer for \"8b005e2d12ffc4c7e290fd796e8399a44f3d73e79e8b6065ae9f200bc8e92869\"" Apr 12 21:30:54.516770 systemd[1]: Started cri-containerd-8b005e2d12ffc4c7e290fd796e8399a44f3d73e79e8b6065ae9f200bc8e92869.scope. Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit: BPF prog-id=162 op=LOAD Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4339 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:54.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862303035653264313266666334633765323930666437393665383339 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4339 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:54.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862303035653264313266666334633765323930666437393665383339 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit: BPF prog-id=163 op=LOAD Apr 12 21:30:54.523000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cddf0 items=0 ppid=4339 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:54.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862303035653264313266666334633765323930666437393665383339 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit: BPF prog-id=164 op=LOAD Apr 12 21:30:54.523000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cde38 items=0 ppid=4339 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:54.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862303035653264313266666334633765323930666437393665383339 Apr 12 21:30:54.523000 audit: BPF prog-id=164 op=UNLOAD Apr 12 21:30:54.523000 audit: BPF prog-id=163 op=UNLOAD Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:54.523000 audit: BPF prog-id=165 op=LOAD Apr 12 21:30:54.523000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ba248 items=0 ppid=4339 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:54.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862303035653264313266666334633765323930666437393665383339 Apr 12 21:30:54.541176 env[1471]: time="2024-04-12T21:30:54.541150699Z" level=info msg="StartContainer for \"8b005e2d12ffc4c7e290fd796e8399a44f3d73e79e8b6065ae9f200bc8e92869\" returns successfully" Apr 12 21:30:54.559259 kubelet[2586]: I0412 21:30:54.559230 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6f86bbfdb-nzxm2" podStartSLOduration=27.353344781 podCreationTimestamp="2024-04-12 21:30:24 +0000 UTC" firstStartedPulling="2024-04-12 21:30:51.293498826 +0000 UTC m=+45.995975775" lastFinishedPulling="2024-04-12 21:30:54.499351082 +0000 UTC m=+49.201828030" observedRunningTime="2024-04-12 21:30:54.558802585 +0000 UTC m=+49.261279533" watchObservedRunningTime="2024-04-12 21:30:54.559197036 +0000 UTC m=+49.261673982" Apr 12 21:30:55.401557 env[1471]: time="2024-04-12T21:30:55.401488780Z" level=info msg="StopPodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\"" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.463 [INFO][4675] k8s.go 585: Cleaning up netns ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.464 [INFO][4675] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" iface="eth0" netns="/var/run/netns/cni-94a26be7-b061-cdc6-f329-9a95105fb8db" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.464 [INFO][4675] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" iface="eth0" netns="/var/run/netns/cni-94a26be7-b061-cdc6-f329-9a95105fb8db" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.464 [INFO][4675] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" iface="eth0" netns="/var/run/netns/cni-94a26be7-b061-cdc6-f329-9a95105fb8db" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.464 [INFO][4675] k8s.go 592: Releasing IP address(es) ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.465 [INFO][4675] utils.go 188: Calico CNI releasing IP address ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.489 [INFO][4692] ipam_plugin.go 415: Releasing address using handleID ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.490 [INFO][4692] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.490 [INFO][4692] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.495 [WARNING][4692] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.495 [INFO][4692] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.496 [INFO][4692] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:55.498458 env[1471]: 2024-04-12 21:30:55.497 [INFO][4675] k8s.go 598: Teardown processing complete. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:30:55.499086 env[1471]: time="2024-04-12T21:30:55.498585852Z" level=info msg="TearDown network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" successfully" Apr 12 21:30:55.499086 env[1471]: time="2024-04-12T21:30:55.498616364Z" level=info msg="StopPodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" returns successfully" Apr 12 21:30:55.499336 env[1471]: time="2024-04-12T21:30:55.499311746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c2bcm,Uid:cfe30a7e-aef4-436e-b448-a3d99fe34a9e,Namespace:kube-system,Attempt:1,}" Apr 12 21:30:55.503355 systemd[1]: run-netns-cni\x2d94a26be7\x2db061\x2dcdc6\x2df329\x2d9a95105fb8db.mount: Deactivated successfully. Apr 12 21:30:55.577790 systemd-networkd[1325]: calib8c9dab86cc: Link UP Apr 12 21:30:55.630515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:30:55.630567 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib8c9dab86cc: link becomes ready Apr 12 21:30:55.630617 systemd-networkd[1325]: calib8c9dab86cc: Gained carrier Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.527 [INFO][4710] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0 coredns-5d78c9869d- kube-system cfe30a7e-aef4-436e-b448-a3d99fe34a9e 715 0 2024-04-12 21:30:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-97ccf21113 coredns-5d78c9869d-c2bcm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib8c9dab86cc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.527 [INFO][4710] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.547 [INFO][4733] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" HandleID="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.554 [INFO][4733] ipam_plugin.go 268: Auto assigning IP ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" HandleID="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002abcb0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-97ccf21113", "pod":"coredns-5d78c9869d-c2bcm", "timestamp":"2024-04-12 21:30:55.547499646 +0000 UTC"}, Hostname:"ci-3510.3.3-a-97ccf21113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.555 [INFO][4733] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.555 [INFO][4733] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.555 [INFO][4733] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-97ccf21113' Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.556 [INFO][4733] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.560 [INFO][4733] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.563 [INFO][4733] ipam.go 489: Trying affinity for 192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.564 [INFO][4733] ipam.go 155: Attempting to load block cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.566 [INFO][4733] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.566 [INFO][4733] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.192/26 handle="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.567 [INFO][4733] ipam.go 1682: Creating new handle: k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.570 [INFO][4733] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.192/26 handle="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.574 [INFO][4733] ipam.go 1216: Successfully claimed IPs: [192.168.30.196/26] block=192.168.30.192/26 handle="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.575 [INFO][4733] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.196/26] handle="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.575 [INFO][4733] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:30:55.636763 env[1471]: 2024-04-12 21:30:55.575 [INFO][4733] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.196/26] IPv6=[] ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" HandleID="k8s-pod-network.5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.637410 env[1471]: 2024-04-12 21:30:55.576 [INFO][4710] k8s.go 385: Populated endpoint ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cfe30a7e-aef4-436e-b448-a3d99fe34a9e", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"", Pod:"coredns-5d78c9869d-c2bcm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib8c9dab86cc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:55.637410 env[1471]: 2024-04-12 21:30:55.576 [INFO][4710] k8s.go 386: Calico CNI using IPs: [192.168.30.196/32] ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.637410 env[1471]: 2024-04-12 21:30:55.576 [INFO][4710] dataplane_linux.go 68: Setting the host side veth name to calib8c9dab86cc ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.637410 env[1471]: 2024-04-12 21:30:55.630 [INFO][4710] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.637410 env[1471]: 2024-04-12 21:30:55.630 [INFO][4710] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cfe30a7e-aef4-436e-b448-a3d99fe34a9e", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b", Pod:"coredns-5d78c9869d-c2bcm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib8c9dab86cc", MAC:"3e:5a:c4:1a:58:ee", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:30:55.637410 env[1471]: 2024-04-12 21:30:55.635 [INFO][4710] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b" Namespace="kube-system" Pod="coredns-5d78c9869d-c2bcm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:30:55.641000 audit[4764]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=4764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:30:55.641000 audit[4764]: SYSCALL arch=c000003e syscall=46 success=yes exit=22260 a0=3 a1=7fff95b6ca90 a2=0 a3=7fff95b6ca7c items=0 ppid=3852 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:30:55.645672 env[1471]: time="2024-04-12T21:30:55.645611934Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:30:55.645672 env[1471]: time="2024-04-12T21:30:55.645633808Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:30:55.645672 env[1471]: time="2024-04-12T21:30:55.645640544Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:30:55.645806 env[1471]: time="2024-04-12T21:30:55.645757970Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b pid=4771 runtime=io.containerd.runc.v2 Apr 12 21:30:55.653786 systemd[1]: Started cri-containerd-5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b.scope. Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit: BPF prog-id=166 op=LOAD Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4771 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623930316637363535653030346539653032663137353662363638 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4771 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623930316637363535653030346539653032663137353662363638 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit: BPF prog-id=167 op=LOAD Apr 12 21:30:55.657000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000382610 items=0 ppid=4771 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623930316637363535653030346539653032663137353662363638 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit: BPF prog-id=168 op=LOAD Apr 12 21:30:55.657000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000382658 items=0 ppid=4771 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623930316637363535653030346539653032663137353662363638 Apr 12 21:30:55.657000 audit: BPF prog-id=168 op=UNLOAD Apr 12 21:30:55.657000 audit: BPF prog-id=167 op=UNLOAD Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.657000 audit: BPF prog-id=169 op=LOAD Apr 12 21:30:55.657000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000382a68 items=0 ppid=4771 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561623930316637363535653030346539653032663137353662363638 Apr 12 21:30:55.674735 env[1471]: time="2024-04-12T21:30:55.674676243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-c2bcm,Uid:cfe30a7e-aef4-436e-b448-a3d99fe34a9e,Namespace:kube-system,Attempt:1,} returns sandbox id \"5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b\"" Apr 12 21:30:55.675992 env[1471]: time="2024-04-12T21:30:55.675960712Z" level=info msg="CreateContainer within sandbox \"5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 21:30:55.680073 env[1471]: time="2024-04-12T21:30:55.680057528Z" level=info msg="CreateContainer within sandbox \"5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dc13e5c1eb05cb844c1bff1b89323db9d89fa0f1840c28e2c28250464a49a744\"" Apr 12 21:30:55.680308 env[1471]: time="2024-04-12T21:30:55.680291887Z" level=info msg="StartContainer for \"dc13e5c1eb05cb844c1bff1b89323db9d89fa0f1840c28e2c28250464a49a744\"" Apr 12 21:30:55.687267 systemd[1]: Started cri-containerd-dc13e5c1eb05cb844c1bff1b89323db9d89fa0f1840c28e2c28250464a49a744.scope. Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.719317 kernel: kauditd_printk_skb: 366 callbacks suppressed Apr 12 21:30:55.719354 kernel: audit: type=1400 audit(1712957455.693:1278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.837087 kernel: audit: type=1400 audit(1712957455.693:1279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.837145 kernel: audit: type=1400 audit(1712957455.693:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.896241 kernel: audit: type=1400 audit(1712957455.693:1281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.956281 kernel: audit: type=1400 audit(1712957455.693:1282): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.015300 kernel: audit: type=1400 audit(1712957455.693:1283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.133238 kernel: audit: type=1400 audit(1712957455.693:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.133319 kernel: audit: type=1400 audit(1712957455.693:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.251565 kernel: audit: type=1400 audit(1712957455.693:1286): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.251624 kernel: audit: type=1400 audit(1712957455.776:1287): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.776000 audit: BPF prog-id=170 op=LOAD Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4771 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313365356331656230356362383434633162666631623839333233 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4771 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313365356331656230356362383434633162666631623839333233 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.777000 audit: BPF prog-id=171 op=LOAD Apr 12 21:30:55.777000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015f8e0 items=0 ppid=4771 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313365356331656230356362383434633162666631623839333233 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:55.894000 audit: BPF prog-id=172 op=LOAD Apr 12 21:30:55.894000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015f928 items=0 ppid=4771 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:55.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313365356331656230356362383434633162666631623839333233 Apr 12 21:30:56.013000 audit: BPF prog-id=172 op=UNLOAD Apr 12 21:30:56.013000 audit: BPF prog-id=171 op=UNLOAD Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.013000 audit: BPF prog-id=173 op=LOAD Apr 12 21:30:56.013000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015fd38 items=0 ppid=4771 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313365356331656230356362383434633162666631623839333233 Apr 12 21:30:56.315961 env[1471]: time="2024-04-12T21:30:56.315725088Z" level=info msg="StartContainer for \"dc13e5c1eb05cb844c1bff1b89323db9d89fa0f1840c28e2c28250464a49a744\" returns successfully" Apr 12 21:30:56.549634 env[1471]: time="2024-04-12T21:30:56.549553971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:56.550074 env[1471]: time="2024-04-12T21:30:56.550037076Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:56.550873 env[1471]: time="2024-04-12T21:30:56.550828893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:56.551876 env[1471]: time="2024-04-12T21:30:56.551830709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:56.552109 env[1471]: time="2024-04-12T21:30:56.552072255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 21:30:56.552568 kubelet[2586]: I0412 21:30:56.552552 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-c2bcm" podStartSLOduration=37.552517526 podCreationTimestamp="2024-04-12 21:30:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:30:56.552276135 +0000 UTC m=+51.254753085" watchObservedRunningTime="2024-04-12 21:30:56.552517526 +0000 UTC m=+51.254994470" Apr 12 21:30:56.553194 env[1471]: time="2024-04-12T21:30:56.553175917Z" level=info msg="CreateContainer within sandbox \"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 21:30:56.558722 env[1471]: time="2024-04-12T21:30:56.558690303Z" level=info msg="CreateContainer within sandbox \"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"356cb27bed17679bc5430410ec47f7577a16540b4639d0cd5020f1ad9c91e072\"" Apr 12 21:30:56.557000 audit[4852]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:56.557000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca8eb0910 a2=0 a3=7ffca8eb08fc items=0 ppid=2812 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:56.558993 env[1471]: time="2024-04-12T21:30:56.558980762Z" level=info msg="StartContainer for \"356cb27bed17679bc5430410ec47f7577a16540b4639d0cd5020f1ad9c91e072\"" Apr 12 21:30:56.568129 systemd[1]: Started cri-containerd-356cb27bed17679bc5430410ec47f7577a16540b4639d0cd5020f1ad9c91e072.scope. Apr 12 21:30:56.558000 audit[4852]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:56.558000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffca8eb0910 a2=0 a3=7ffca8eb08fc items=0 ppid=2812 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe0732c72c8 items=0 ppid=4553 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335366362323762656431373637396263353433303431306563343766 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit: BPF prog-id=174 op=LOAD Apr 12 21:30:56.573000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=4553 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335366362323762656431373637396263353433303431306563343766 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit: BPF prog-id=175 op=LOAD Apr 12 21:30:56.573000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=4553 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335366362323762656431373637396263353433303431306563343766 Apr 12 21:30:56.573000 audit: BPF prog-id=175 op=UNLOAD Apr 12 21:30:56.573000 audit: BPF prog-id=174 op=UNLOAD Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { perfmon } for pid=4860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit[4860]: AVC avc: denied { bpf } for pid=4860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:56.573000 audit: BPF prog-id=176 op=LOAD Apr 12 21:30:56.573000 audit[4860]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=4553 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:56.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335366362323762656431373637396263353433303431306563343766 Apr 12 21:30:56.580685 env[1471]: time="2024-04-12T21:30:56.580633165Z" level=info msg="StartContainer for \"356cb27bed17679bc5430410ec47f7577a16540b4639d0cd5020f1ad9c91e072\" returns successfully" Apr 12 21:30:56.581195 env[1471]: time="2024-04-12T21:30:56.581183609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 21:30:57.143557 systemd-networkd[1325]: calib8c9dab86cc: Gained IPv6LL Apr 12 21:30:57.595000 audit[4887]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:57.595000 audit[4887]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffbbadd9f0 a2=0 a3=7fffbbadd9dc items=0 ppid=2812 pid=4887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:57.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:57.610000 audit[4887]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:30:57.610000 audit[4887]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffbbadd9f0 a2=0 a3=7fffbbadd9dc items=0 ppid=2812 pid=4887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:57.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:30:58.434029 env[1471]: time="2024-04-12T21:30:58.434005536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:58.434803 env[1471]: time="2024-04-12T21:30:58.434790964Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:58.435798 env[1471]: time="2024-04-12T21:30:58.435776983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:58.437106 env[1471]: time="2024-04-12T21:30:58.437093373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:30:58.437327 env[1471]: time="2024-04-12T21:30:58.437313761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 21:30:58.439198 env[1471]: time="2024-04-12T21:30:58.439179616Z" level=info msg="CreateContainer within sandbox \"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 21:30:58.444563 env[1471]: time="2024-04-12T21:30:58.444511337Z" level=info msg="CreateContainer within sandbox \"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"09366a5c41187c1210f5106bbcd6cb247f3953ea6da9b5b2a75d6f5c507c6d7f\"" Apr 12 21:30:58.444942 env[1471]: time="2024-04-12T21:30:58.444929502Z" level=info msg="StartContainer for \"09366a5c41187c1210f5106bbcd6cb247f3953ea6da9b5b2a75d6f5c507c6d7f\"" Apr 12 21:30:58.454425 systemd[1]: Started cri-containerd-09366a5c41187c1210f5106bbcd6cb247f3953ea6da9b5b2a75d6f5c507c6d7f.scope. Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3061bdc2f8 items=0 ppid=4553 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:58.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039333636613563343131383763313231306635313036626263643663 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.459000 audit: BPF prog-id=177 op=LOAD Apr 12 21:30:58.459000 audit[4907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024968 items=0 ppid=4553 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:58.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039333636613563343131383763313231306635313036626263643663 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit: BPF prog-id=178 op=LOAD Apr 12 21:30:58.460000 audit[4907]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000249b8 items=0 ppid=4553 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:58.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039333636613563343131383763313231306635313036626263643663 Apr 12 21:30:58.460000 audit: BPF prog-id=178 op=UNLOAD Apr 12 21:30:58.460000 audit: BPF prog-id=177 op=UNLOAD Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { perfmon } for pid=4907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit[4907]: AVC avc: denied { bpf } for pid=4907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:30:58.460000 audit: BPF prog-id=179 op=LOAD Apr 12 21:30:58.460000 audit[4907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024a48 items=0 ppid=4553 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:30:58.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039333636613563343131383763313231306635313036626263643663 Apr 12 21:30:58.467247 env[1471]: time="2024-04-12T21:30:58.467212117Z" level=info msg="StartContainer for \"09366a5c41187c1210f5106bbcd6cb247f3953ea6da9b5b2a75d6f5c507c6d7f\" returns successfully" Apr 12 21:30:58.585083 kubelet[2586]: I0412 21:30:58.585009 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xxfd9" podStartSLOduration=27.853791985 podCreationTimestamp="2024-04-12 21:30:24 +0000 UTC" firstStartedPulling="2024-04-12 21:30:51.706419999 +0000 UTC m=+46.408896943" lastFinishedPulling="2024-04-12 21:30:58.437500739 +0000 UTC m=+53.139977687" observedRunningTime="2024-04-12 21:30:58.584565238 +0000 UTC m=+53.287042305" watchObservedRunningTime="2024-04-12 21:30:58.584872729 +0000 UTC m=+53.287349752" Apr 12 21:30:59.452380 kubelet[2586]: I0412 21:30:59.452277 2586 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 21:30:59.452380 kubelet[2586]: I0412 21:30:59.452356 2586 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 21:31:01.756000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.783562 kernel: kauditd_printk_skb: 145 callbacks suppressed Apr 12 21:31:01.783651 kernel: audit: type=1400 audit(1712957461.756:1312): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.756000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0143a1410 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.968403 kernel: audit: type=1300 audit(1712957461.756:1312): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0143a1410 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.968428 kernel: audit: type=1327 audit(1712957461.756:1312): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:01.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:01.756000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:02.146902 kernel: audit: type=1400 audit(1712957461.756:1313): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:02.146933 kernel: audit: type=1300 audit(1712957461.756:1313): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00aa15800 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.756000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00aa15800 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:02.241446 kernel: audit: type=1327 audit(1712957461.756:1313): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:01.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:02.330818 kernel: audit: type=1400 audit(1712957461.756:1314): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.756000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:02.418217 kernel: audit: type=1300 audit(1712957461.756:1314): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00a58e540 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.756000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00a58e540 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:02.514897 kernel: audit: type=1327 audit(1712957461.756:1314): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:01.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:02.608841 kernel: audit: type=1400 audit(1712957461.771:1315): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c014de4f40 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c01078e8a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0084fa1b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:31:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:31:02.016000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:02.016000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a0fdd0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:31:02.016000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:31:02.016000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:02.016000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cbcfe0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:31:02.016000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:31:05.398166 env[1471]: time="2024-04-12T21:31:05.398129223Z" level=info msg="StopPodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\"" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.418 [WARNING][4958] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cfe30a7e-aef4-436e-b448-a3d99fe34a9e", ResourceVersion:"733", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b", Pod:"coredns-5d78c9869d-c2bcm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib8c9dab86cc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.418 [INFO][4958] k8s.go 585: Cleaning up netns ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.418 [INFO][4958] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" iface="eth0" netns="" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.418 [INFO][4958] k8s.go 592: Releasing IP address(es) ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.418 [INFO][4958] utils.go 188: Calico CNI releasing IP address ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.429 [INFO][4972] ipam_plugin.go 415: Releasing address using handleID ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.429 [INFO][4972] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.429 [INFO][4972] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.434 [WARNING][4972] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.434 [INFO][4972] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.435 [INFO][4972] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.437124 env[1471]: 2024-04-12 21:31:05.436 [INFO][4958] k8s.go 598: Teardown processing complete. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.437619 env[1471]: time="2024-04-12T21:31:05.437145800Z" level=info msg="TearDown network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" successfully" Apr 12 21:31:05.437619 env[1471]: time="2024-04-12T21:31:05.437176137Z" level=info msg="StopPodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" returns successfully" Apr 12 21:31:05.437619 env[1471]: time="2024-04-12T21:31:05.437488543Z" level=info msg="RemovePodSandbox for \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\"" Apr 12 21:31:05.437619 env[1471]: time="2024-04-12T21:31:05.437512179Z" level=info msg="Forcibly stopping sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\"" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.464 [WARNING][5004] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cfe30a7e-aef4-436e-b448-a3d99fe34a9e", ResourceVersion:"733", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"5ab901f7655e004e9e02f1756b668758156853ae3527796af8d5e7d6f1b4d20b", Pod:"coredns-5d78c9869d-c2bcm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib8c9dab86cc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.464 [INFO][5004] k8s.go 585: Cleaning up netns ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.464 [INFO][5004] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" iface="eth0" netns="" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.464 [INFO][5004] k8s.go 592: Releasing IP address(es) ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.464 [INFO][5004] utils.go 188: Calico CNI releasing IP address ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.476 [INFO][5021] ipam_plugin.go 415: Releasing address using handleID ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.476 [INFO][5021] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.476 [INFO][5021] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.480 [WARNING][5021] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.480 [INFO][5021] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" HandleID="k8s-pod-network.0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c2bcm-eth0" Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.481 [INFO][5021] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.482636 env[1471]: 2024-04-12 21:31:05.482 [INFO][5004] k8s.go 598: Teardown processing complete. ContainerID="0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b" Apr 12 21:31:05.482966 env[1471]: time="2024-04-12T21:31:05.482655110Z" level=info msg="TearDown network for sandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" successfully" Apr 12 21:31:05.497264 env[1471]: time="2024-04-12T21:31:05.497245643Z" level=info msg="RemovePodSandbox \"0cd3812cb5c337b43426f92ceaebf032b1aa079d90d28cc00ba74f8fbc08f78b\" returns successfully" Apr 12 21:31:05.497614 env[1471]: time="2024-04-12T21:31:05.497593145Z" level=info msg="StopPodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\"" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.526 [WARNING][5050] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"99486f6b-88be-4d88-ba86-6a97830a6016", ResourceVersion:"685", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6", Pod:"coredns-5d78c9869d-c296v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d1ee32028e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.526 [INFO][5050] k8s.go 585: Cleaning up netns ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.526 [INFO][5050] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" iface="eth0" netns="" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.526 [INFO][5050] k8s.go 592: Releasing IP address(es) ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.526 [INFO][5050] utils.go 188: Calico CNI releasing IP address ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.550 [INFO][5067] ipam_plugin.go 415: Releasing address using handleID ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.551 [INFO][5067] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.551 [INFO][5067] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.558 [WARNING][5067] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.558 [INFO][5067] ipam_plugin.go 443: Releasing address using workloadID ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.560 [INFO][5067] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.562448 env[1471]: 2024-04-12 21:31:05.561 [INFO][5050] k8s.go 598: Teardown processing complete. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.563111 env[1471]: time="2024-04-12T21:31:05.562449465Z" level=info msg="TearDown network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" successfully" Apr 12 21:31:05.563111 env[1471]: time="2024-04-12T21:31:05.562484618Z" level=info msg="StopPodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" returns successfully" Apr 12 21:31:05.563111 env[1471]: time="2024-04-12T21:31:05.562890239Z" level=info msg="RemovePodSandbox for \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\"" Apr 12 21:31:05.563111 env[1471]: time="2024-04-12T21:31:05.562924608Z" level=info msg="Forcibly stopping sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\"" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.596 [WARNING][5100] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"99486f6b-88be-4d88-ba86-6a97830a6016", ResourceVersion:"685", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"108c3f754c97668f5e32501c1b5993f01ce7b45290514d3e0fdbedc3ba1842e6", Pod:"coredns-5d78c9869d-c296v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.30.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d1ee32028e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.596 [INFO][5100] k8s.go 585: Cleaning up netns ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.596 [INFO][5100] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" iface="eth0" netns="" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.596 [INFO][5100] k8s.go 592: Releasing IP address(es) ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.596 [INFO][5100] utils.go 188: Calico CNI releasing IP address ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.616 [INFO][5118] ipam_plugin.go 415: Releasing address using handleID ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.616 [INFO][5118] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.616 [INFO][5118] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.622 [WARNING][5118] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.622 [INFO][5118] ipam_plugin.go 443: Releasing address using workloadID ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" HandleID="k8s-pod-network.34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Workload="ci--3510.3.3--a--97ccf21113-k8s-coredns--5d78c9869d--c296v-eth0" Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.624 [INFO][5118] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.626630 env[1471]: 2024-04-12 21:31:05.625 [INFO][5100] k8s.go 598: Teardown processing complete. ContainerID="34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf" Apr 12 21:31:05.627220 env[1471]: time="2024-04-12T21:31:05.626654015Z" level=info msg="TearDown network for sandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" successfully" Apr 12 21:31:05.628989 env[1471]: time="2024-04-12T21:31:05.628938482Z" level=info msg="RemovePodSandbox \"34908da79baa5e62f77f64866dc6a9883a22199efc87af04d09eabb116eb17cf\" returns successfully" Apr 12 21:31:05.629387 env[1471]: time="2024-04-12T21:31:05.629335334Z" level=info msg="StopPodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\"" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.672 [WARNING][5149] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0", GenerateName:"calico-kube-controllers-6f86bbfdb-", Namespace:"calico-system", SelfLink:"", UID:"02155b46-f794-4bf5-abac-36b54ece36cb", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f86bbfdb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263", Pod:"calico-kube-controllers-6f86bbfdb-nzxm2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.30.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali267400a54c3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.672 [INFO][5149] k8s.go 585: Cleaning up netns ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.672 [INFO][5149] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" iface="eth0" netns="" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.672 [INFO][5149] k8s.go 592: Releasing IP address(es) ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.672 [INFO][5149] utils.go 188: Calico CNI releasing IP address ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.700 [INFO][5166] ipam_plugin.go 415: Releasing address using handleID ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.700 [INFO][5166] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.700 [INFO][5166] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.709 [WARNING][5166] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.709 [INFO][5166] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.711 [INFO][5166] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.714368 env[1471]: 2024-04-12 21:31:05.712 [INFO][5149] k8s.go 598: Teardown processing complete. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.714368 env[1471]: time="2024-04-12T21:31:05.714333673Z" level=info msg="TearDown network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" successfully" Apr 12 21:31:05.715336 env[1471]: time="2024-04-12T21:31:05.714372667Z" level=info msg="StopPodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" returns successfully" Apr 12 21:31:05.715336 env[1471]: time="2024-04-12T21:31:05.714901446Z" level=info msg="RemovePodSandbox for \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\"" Apr 12 21:31:05.715336 env[1471]: time="2024-04-12T21:31:05.714944123Z" level=info msg="Forcibly stopping sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\"" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.760 [WARNING][5201] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0", GenerateName:"calico-kube-controllers-6f86bbfdb-", Namespace:"calico-system", SelfLink:"", UID:"02155b46-f794-4bf5-abac-36b54ece36cb", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f86bbfdb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"dc9ea5759e778a0de5cec50258ce2e89ab1d8b0699179d88514b1ee8c3be8263", Pod:"calico-kube-controllers-6f86bbfdb-nzxm2", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.30.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali267400a54c3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.760 [INFO][5201] k8s.go 585: Cleaning up netns ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.760 [INFO][5201] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" iface="eth0" netns="" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.760 [INFO][5201] k8s.go 592: Releasing IP address(es) ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.760 [INFO][5201] utils.go 188: Calico CNI releasing IP address ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.787 [INFO][5216] ipam_plugin.go 415: Releasing address using handleID ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.787 [INFO][5216] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.787 [INFO][5216] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.796 [WARNING][5216] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.796 [INFO][5216] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" HandleID="k8s-pod-network.c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--kube--controllers--6f86bbfdb--nzxm2-eth0" Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.798 [INFO][5216] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.801742 env[1471]: 2024-04-12 21:31:05.800 [INFO][5201] k8s.go 598: Teardown processing complete. ContainerID="c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708" Apr 12 21:31:05.802561 env[1471]: time="2024-04-12T21:31:05.801743670Z" level=info msg="TearDown network for sandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" successfully" Apr 12 21:31:05.804604 env[1471]: time="2024-04-12T21:31:05.804540655Z" level=info msg="RemovePodSandbox \"c65f4261d4178f29ee46512c23d0818d9ff0d6faebf7fea10c95e2390b5ff708\" returns successfully" Apr 12 21:31:05.805077 env[1471]: time="2024-04-12T21:31:05.805041560Z" level=info msg="StopPodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\"" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.847 [WARNING][5248] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4", ResourceVersion:"744", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e", Pod:"csi-node-driver-xxfd9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib78a3e1a6a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.847 [INFO][5248] k8s.go 585: Cleaning up netns ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.848 [INFO][5248] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" iface="eth0" netns="" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.848 [INFO][5248] k8s.go 592: Releasing IP address(es) ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.848 [INFO][5248] utils.go 188: Calico CNI releasing IP address ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.869 [INFO][5267] ipam_plugin.go 415: Releasing address using handleID ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.869 [INFO][5267] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.869 [INFO][5267] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.876 [WARNING][5267] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.876 [INFO][5267] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.878 [INFO][5267] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.880738 env[1471]: 2024-04-12 21:31:05.879 [INFO][5248] k8s.go 598: Teardown processing complete. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.881387 env[1471]: time="2024-04-12T21:31:05.880768203Z" level=info msg="TearDown network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" successfully" Apr 12 21:31:05.881387 env[1471]: time="2024-04-12T21:31:05.880801867Z" level=info msg="StopPodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" returns successfully" Apr 12 21:31:05.881387 env[1471]: time="2024-04-12T21:31:05.881249493Z" level=info msg="RemovePodSandbox for \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\"" Apr 12 21:31:05.881387 env[1471]: time="2024-04-12T21:31:05.881287489Z" level=info msg="Forcibly stopping sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\"" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.929 [WARNING][5299] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0dbae0a5-e3c3-44ef-ab4f-611777ecc1a4", ResourceVersion:"744", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 30, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"15744d9161d0810a5fa31979684d5e5559fc61b45d26530cd1ad46129937d68e", Pod:"csi-node-driver-xxfd9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib78a3e1a6a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.929 [INFO][5299] k8s.go 585: Cleaning up netns ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.929 [INFO][5299] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" iface="eth0" netns="" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.930 [INFO][5299] k8s.go 592: Releasing IP address(es) ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.930 [INFO][5299] utils.go 188: Calico CNI releasing IP address ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.964 [INFO][5315] ipam_plugin.go 415: Releasing address using handleID ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.964 [INFO][5315] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.964 [INFO][5315] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.971 [WARNING][5315] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.971 [INFO][5315] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" HandleID="k8s-pod-network.1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Workload="ci--3510.3.3--a--97ccf21113-k8s-csi--node--driver--xxfd9-eth0" Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.972 [INFO][5315] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:05.974884 env[1471]: 2024-04-12 21:31:05.973 [INFO][5299] k8s.go 598: Teardown processing complete. ContainerID="1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600" Apr 12 21:31:05.974884 env[1471]: time="2024-04-12T21:31:05.974865856Z" level=info msg="TearDown network for sandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" successfully" Apr 12 21:31:05.976928 env[1471]: time="2024-04-12T21:31:05.976905352Z" level=info msg="RemovePodSandbox \"1a0339b45b6809346ae4ee27bf76b12827862273c12d8781313f95b050f7c600\" returns successfully" Apr 12 21:31:14.688000 audit[5405]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:14.694396 kubelet[2586]: I0412 21:31:14.694369 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:31:14.696009 kubelet[2586]: I0412 21:31:14.695990 2586 topology_manager.go:212] "Topology Admit Handler" Apr 12 21:31:14.698326 systemd[1]: Created slice kubepods-besteffort-podd730c9f0_eb82_4547_a024_8ae9a222dfc3.slice. Apr 12 21:31:14.701900 systemd[1]: Created slice kubepods-besteffort-pod8bbd2ea3_790f_44bc_91aa_b402379217d2.slice. Apr 12 21:31:14.716500 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:31:14.716567 kernel: audit: type=1325 audit(1712957474.688:1320): table=filter:111 family=2 entries=9 op=nft_register_rule pid=5405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:14.688000 audit[5405]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff30be6ec0 a2=0 a3=7fff30be6eac items=0 ppid=2812 pid=5405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:14.797597 kubelet[2586]: I0412 21:31:14.797548 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d730c9f0-eb82-4547-a024-8ae9a222dfc3-calico-apiserver-certs\") pod \"calico-apiserver-6fbcf64d75-x9m6k\" (UID: \"d730c9f0-eb82-4547-a024-8ae9a222dfc3\") " pod="calico-apiserver/calico-apiserver-6fbcf64d75-x9m6k" Apr 12 21:31:14.797597 kubelet[2586]: I0412 21:31:14.797574 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cmm58\" (UniqueName: \"kubernetes.io/projected/d730c9f0-eb82-4547-a024-8ae9a222dfc3-kube-api-access-cmm58\") pod \"calico-apiserver-6fbcf64d75-x9m6k\" (UID: \"d730c9f0-eb82-4547-a024-8ae9a222dfc3\") " pod="calico-apiserver/calico-apiserver-6fbcf64d75-x9m6k" Apr 12 21:31:14.797597 kubelet[2586]: I0412 21:31:14.797588 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8bbd2ea3-790f-44bc-91aa-b402379217d2-calico-apiserver-certs\") pod \"calico-apiserver-6fbcf64d75-qhlgm\" (UID: \"8bbd2ea3-790f-44bc-91aa-b402379217d2\") " pod="calico-apiserver/calico-apiserver-6fbcf64d75-qhlgm" Apr 12 21:31:14.797722 kubelet[2586]: I0412 21:31:14.797648 2586 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ql959\" (UniqueName: \"kubernetes.io/projected/8bbd2ea3-790f-44bc-91aa-b402379217d2-kube-api-access-ql959\") pod \"calico-apiserver-6fbcf64d75-qhlgm\" (UID: \"8bbd2ea3-790f-44bc-91aa-b402379217d2\") " pod="calico-apiserver/calico-apiserver-6fbcf64d75-qhlgm" Apr 12 21:31:14.873318 kernel: audit: type=1300 audit(1712957474.688:1320): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff30be6ec0 a2=0 a3=7fff30be6eac items=0 ppid=2812 pid=5405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:14.873362 kernel: audit: type=1327 audit(1712957474.688:1320): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:14.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:14.898680 kubelet[2586]: E0412 21:31:14.898642 2586 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 21:31:14.898680 kubelet[2586]: E0412 21:31:14.898642 2586 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 21:31:14.898749 kubelet[2586]: E0412 21:31:14.898683 2586 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/8bbd2ea3-790f-44bc-91aa-b402379217d2-calico-apiserver-certs podName:8bbd2ea3-790f-44bc-91aa-b402379217d2 nodeName:}" failed. No retries permitted until 2024-04-12 21:31:15.398671297 +0000 UTC m=+70.101148241 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/8bbd2ea3-790f-44bc-91aa-b402379217d2-calico-apiserver-certs") pod "calico-apiserver-6fbcf64d75-qhlgm" (UID: "8bbd2ea3-790f-44bc-91aa-b402379217d2") : secret "calico-apiserver-certs" not found Apr 12 21:31:14.898749 kubelet[2586]: E0412 21:31:14.898698 2586 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d730c9f0-eb82-4547-a024-8ae9a222dfc3-calico-apiserver-certs podName:d730c9f0-eb82-4547-a024-8ae9a222dfc3 nodeName:}" failed. No retries permitted until 2024-04-12 21:31:15.398691557 +0000 UTC m=+70.101168505 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d730c9f0-eb82-4547-a024-8ae9a222dfc3-calico-apiserver-certs") pod "calico-apiserver-6fbcf64d75-x9m6k" (UID: "d730c9f0-eb82-4547-a024-8ae9a222dfc3") : secret "calico-apiserver-certs" not found Apr 12 21:31:14.689000 audit[5405]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:14.689000 audit[5405]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff30be6ec0 a2=0 a3=7fff30be6eac items=0 ppid=2812 pid=5405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.091046 kernel: audit: type=1325 audit(1712957474.689:1321): table=nat:112 family=2 entries=20 op=nft_register_rule pid=5405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:15.091106 kernel: audit: type=1300 audit(1712957474.689:1321): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff30be6ec0 a2=0 a3=7fff30be6eac items=0 ppid=2812 pid=5405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.091123 kernel: audit: type=1327 audit(1712957474.689:1321): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:14.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:14.936000 audit[5409]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:14.936000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff41c81ec0 a2=0 a3=7fff41c81eac items=0 ppid=2812 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.309888 kernel: audit: type=1325 audit(1712957474.936:1322): table=filter:113 family=2 entries=10 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:15.309929 kernel: audit: type=1300 audit(1712957474.936:1322): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff41c81ec0 a2=0 a3=7fff41c81eac items=0 ppid=2812 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.309948 kernel: audit: type=1327 audit(1712957474.936:1322): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:14.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:15.151000 audit[5409]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:15.151000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff41c81ec0 a2=0 a3=7fff41c81eac items=0 ppid=2812 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:15.434327 kernel: audit: type=1325 audit(1712957475.151:1323): table=nat:114 family=2 entries=20 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:15.601031 env[1471]: time="2024-04-12T21:31:15.600958755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbcf64d75-x9m6k,Uid:d730c9f0-eb82-4547-a024-8ae9a222dfc3,Namespace:calico-apiserver,Attempt:0,}" Apr 12 21:31:15.603562 env[1471]: time="2024-04-12T21:31:15.603502696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbcf64d75-qhlgm,Uid:8bbd2ea3-790f-44bc-91aa-b402379217d2,Namespace:calico-apiserver,Attempt:0,}" Apr 12 21:31:15.664058 systemd-networkd[1325]: calid2f29cceeac: Link UP Apr 12 21:31:15.720230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:31:15.720325 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2f29cceeac: link becomes ready Apr 12 21:31:15.720330 systemd-networkd[1325]: calid2f29cceeac: Gained carrier Apr 12 21:31:15.720921 systemd-networkd[1325]: cali43a00617c17: Link UP Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.625 [INFO][5423] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0 calico-apiserver-6fbcf64d75- calico-apiserver 8bbd2ea3-790f-44bc-91aa-b402379217d2 823 0 2024-04-12 21:31:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fbcf64d75 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-97ccf21113 calico-apiserver-6fbcf64d75-qhlgm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid2f29cceeac [] []}} ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.625 [INFO][5423] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.640 [INFO][5458] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" HandleID="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.647 [INFO][5458] ipam_plugin.go 268: Auto assigning IP ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" HandleID="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000507ce0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-97ccf21113", "pod":"calico-apiserver-6fbcf64d75-qhlgm", "timestamp":"2024-04-12 21:31:15.640463556 +0000 UTC"}, Hostname:"ci-3510.3.3-a-97ccf21113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.647 [INFO][5458] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.647 [INFO][5458] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.647 [INFO][5458] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-97ccf21113' Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.648 [INFO][5458] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.651 [INFO][5458] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.653 [INFO][5458] ipam.go 489: Trying affinity for 192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.654 [INFO][5458] ipam.go 155: Attempting to load block cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.656 [INFO][5458] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.656 [INFO][5458] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.192/26 handle="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.657 [INFO][5458] ipam.go 1682: Creating new handle: k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.659 [INFO][5458] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.192/26 handle="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.662 [INFO][5458] ipam.go 1216: Successfully claimed IPs: [192.168.30.197/26] block=192.168.30.192/26 handle="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.662 [INFO][5458] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.197/26] handle="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.662 [INFO][5458] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:15.725137 env[1471]: 2024-04-12 21:31:15.662 [INFO][5458] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.197/26] IPv6=[] ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" HandleID="k8s-pod-network.ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.725690 env[1471]: 2024-04-12 21:31:15.663 [INFO][5423] k8s.go 385: Populated endpoint ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0", GenerateName:"calico-apiserver-6fbcf64d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"8bbd2ea3-790f-44bc-91aa-b402379217d2", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbcf64d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"", Pod:"calico-apiserver-6fbcf64d75-qhlgm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.30.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid2f29cceeac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:15.725690 env[1471]: 2024-04-12 21:31:15.663 [INFO][5423] k8s.go 386: Calico CNI using IPs: [192.168.30.197/32] ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.725690 env[1471]: 2024-04-12 21:31:15.663 [INFO][5423] dataplane_linux.go 68: Setting the host side veth name to calid2f29cceeac ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.725690 env[1471]: 2024-04-12 21:31:15.720 [INFO][5423] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.725690 env[1471]: 2024-04-12 21:31:15.720 [INFO][5423] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0", GenerateName:"calico-apiserver-6fbcf64d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"8bbd2ea3-790f-44bc-91aa-b402379217d2", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbcf64d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc", Pod:"calico-apiserver-6fbcf64d75-qhlgm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.30.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid2f29cceeac", MAC:"4a:d8:27:fc:b7:ed", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:15.725690 env[1471]: 2024-04-12 21:31:15.724 [INFO][5423] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-qhlgm" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--qhlgm-eth0" Apr 12 21:31:15.732000 audit[5515]: NETFILTER_CFG table=filter:115 family=2 entries=55 op=nft_register_chain pid=5515 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:31:15.732000 audit[5515]: SYSCALL arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7ffe56f6ee50 a2=0 a3=7ffe56f6ee3c items=0 ppid=3852 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:31:15.740306 env[1471]: time="2024-04-12T21:31:15.740151805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:31:15.740306 env[1471]: time="2024-04-12T21:31:15.740262340Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:31:15.740306 env[1471]: time="2024-04-12T21:31:15.740269261Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:31:15.740437 env[1471]: time="2024-04-12T21:31:15.740391362Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc pid=5523 runtime=io.containerd.runc.v2 Apr 12 21:31:15.746303 systemd[1]: Started cri-containerd-ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc.scope. Apr 12 21:31:15.749251 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali43a00617c17: link becomes ready Apr 12 21:31:15.749288 systemd-networkd[1325]: cali43a00617c17: Gained carrier Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.755000 audit: BPF prog-id=180 op=LOAD Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=5523 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626135666136336430353731303837613031663436346662353539 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=5523 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626135666136336430353731303837613031663436346662353539 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit: BPF prog-id=181 op=LOAD Apr 12 21:31:15.756000 audit[5533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001dbad0 items=0 ppid=5523 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626135666136336430353731303837613031663436346662353539 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit: BPF prog-id=182 op=LOAD Apr 12 21:31:15.756000 audit[5533]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001dbb18 items=0 ppid=5523 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626135666136336430353731303837613031663436346662353539 Apr 12 21:31:15.756000 audit: BPF prog-id=182 op=UNLOAD Apr 12 21:31:15.756000 audit: BPF prog-id=181 op=UNLOAD Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { perfmon } for pid=5533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit[5533]: AVC avc: denied { bpf } for pid=5533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.756000 audit: BPF prog-id=183 op=LOAD Apr 12 21:31:15.756000 audit[5533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001dbf28 items=0 ppid=5523 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626135666136336430353731303837613031663436346662353539 Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.625 [INFO][5412] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0 calico-apiserver-6fbcf64d75- calico-apiserver d730c9f0-eb82-4547-a024-8ae9a222dfc3 821 0 2024-04-12 21:31:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fbcf64d75 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-97ccf21113 calico-apiserver-6fbcf64d75-x9m6k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali43a00617c17 [] []}} ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.625 [INFO][5412] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.640 [INFO][5460] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" HandleID="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.647 [INFO][5460] ipam_plugin.go 268: Auto assigning IP ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" HandleID="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bf2e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-97ccf21113", "pod":"calico-apiserver-6fbcf64d75-x9m6k", "timestamp":"2024-04-12 21:31:15.640479965 +0000 UTC"}, Hostname:"ci-3510.3.3-a-97ccf21113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.647 [INFO][5460] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.662 [INFO][5460] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.662 [INFO][5460] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-97ccf21113' Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.678 [INFO][5460] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.681 [INFO][5460] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.684 [INFO][5460] ipam.go 489: Trying affinity for 192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.686 [INFO][5460] ipam.go 155: Attempting to load block cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.687 [INFO][5460] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.192/26 host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.687 [INFO][5460] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.192/26 handle="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.688 [INFO][5460] ipam.go 1682: Creating new handle: k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0 Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.691 [INFO][5460] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.192/26 handle="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.693 [INFO][5460] ipam.go 1216: Successfully claimed IPs: [192.168.30.198/26] block=192.168.30.192/26 handle="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.693 [INFO][5460] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.198/26] handle="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" host="ci-3510.3.3-a-97ccf21113" Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.693 [INFO][5460] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:31:15.763252 env[1471]: 2024-04-12 21:31:15.693 [INFO][5460] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.198/26] IPv6=[] ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" HandleID="k8s-pod-network.aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Workload="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.763750 env[1471]: 2024-04-12 21:31:15.694 [INFO][5412] k8s.go 385: Populated endpoint ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0", GenerateName:"calico-apiserver-6fbcf64d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"d730c9f0-eb82-4547-a024-8ae9a222dfc3", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbcf64d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"", Pod:"calico-apiserver-6fbcf64d75-x9m6k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.30.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali43a00617c17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:15.763750 env[1471]: 2024-04-12 21:31:15.694 [INFO][5412] k8s.go 386: Calico CNI using IPs: [192.168.30.198/32] ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.763750 env[1471]: 2024-04-12 21:31:15.694 [INFO][5412] dataplane_linux.go 68: Setting the host side veth name to cali43a00617c17 ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.763750 env[1471]: 2024-04-12 21:31:15.749 [INFO][5412] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.763750 env[1471]: 2024-04-12 21:31:15.758 [INFO][5412] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0", GenerateName:"calico-apiserver-6fbcf64d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"d730c9f0-eb82-4547-a024-8ae9a222dfc3", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbcf64d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-97ccf21113", ContainerID:"aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0", Pod:"calico-apiserver-6fbcf64d75-x9m6k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.30.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali43a00617c17", MAC:"86:e5:c6:15:df:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:31:15.763750 env[1471]: 2024-04-12 21:31:15.762 [INFO][5412] k8s.go 498: Wrote updated endpoint to datastore ContainerID="aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0" Namespace="calico-apiserver" Pod="calico-apiserver-6fbcf64d75-x9m6k" WorkloadEndpoint="ci--3510.3.3--a--97ccf21113-k8s-calico--apiserver--6fbcf64d75--x9m6k-eth0" Apr 12 21:31:15.768831 env[1471]: time="2024-04-12T21:31:15.768797408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:31:15.768831 env[1471]: time="2024-04-12T21:31:15.768818712Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:31:15.768831 env[1471]: time="2024-04-12T21:31:15.768828389Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:31:15.768955 env[1471]: time="2024-04-12T21:31:15.768890855Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0 pid=5568 runtime=io.containerd.runc.v2 Apr 12 21:31:15.768000 audit[5574]: NETFILTER_CFG table=filter:116 family=2 entries=46 op=nft_register_chain pid=5574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:31:15.768000 audit[5574]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffd2be87d20 a2=0 a3=7ffd2be87d0c items=0 ppid=3852 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:31:15.773335 env[1471]: time="2024-04-12T21:31:15.773301643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbcf64d75-qhlgm,Uid:8bbd2ea3-790f-44bc-91aa-b402379217d2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc\"" Apr 12 21:31:15.774110 env[1471]: time="2024-04-12T21:31:15.774095909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 21:31:15.775124 systemd[1]: Started cri-containerd-aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0.scope. Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit: BPF prog-id=184 op=LOAD Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5568 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613231633736343736313031643536353531313631356632306639 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5568 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613231633736343736313031643536353531313631356632306639 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit: BPF prog-id=185 op=LOAD Apr 12 21:31:15.780000 audit[5580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032dd10 items=0 ppid=5568 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613231633736343736313031643536353531313631356632306639 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.780000 audit: BPF prog-id=186 op=LOAD Apr 12 21:31:15.780000 audit[5580]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032dd58 items=0 ppid=5568 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613231633736343736313031643536353531313631356632306639 Apr 12 21:31:15.781000 audit: BPF prog-id=186 op=UNLOAD Apr 12 21:31:15.781000 audit: BPF prog-id=185 op=UNLOAD Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { perfmon } for pid=5580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit[5580]: AVC avc: denied { bpf } for pid=5580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:15.781000 audit: BPF prog-id=187 op=LOAD Apr 12 21:31:15.781000 audit[5580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ae168 items=0 ppid=5568 pid=5580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:15.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613231633736343736313031643536353531313631356632306639 Apr 12 21:31:15.798044 env[1471]: time="2024-04-12T21:31:15.797995766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbcf64d75-x9m6k,Uid:d730c9f0-eb82-4547-a024-8ae9a222dfc3,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0\"" Apr 12 21:31:17.240373 systemd-networkd[1325]: cali43a00617c17: Gained IPv6LL Apr 12 21:31:17.251230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2965698771.mount: Deactivated successfully. Apr 12 21:31:17.751523 systemd-networkd[1325]: calid2f29cceeac: Gained IPv6LL Apr 12 21:31:18.635000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:18.635000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ab8c20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:31:18.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:31:18.637000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:18.637000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000501a20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:31:18.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:31:18.639000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:18.639000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ab8ee0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:31:18.639000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:31:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:31:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ab8f00 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:31:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:31:18.694946 env[1471]: time="2024-04-12T21:31:18.694896303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:18.695594 env[1471]: time="2024-04-12T21:31:18.695561395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:18.696145 env[1471]: time="2024-04-12T21:31:18.696110796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:18.696789 env[1471]: time="2024-04-12T21:31:18.696749107Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:18.697091 env[1471]: time="2024-04-12T21:31:18.697057109Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 21:31:18.697632 env[1471]: time="2024-04-12T21:31:18.697617267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 21:31:18.698462 env[1471]: time="2024-04-12T21:31:18.698449196Z" level=info msg="CreateContainer within sandbox \"ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 21:31:18.702933 env[1471]: time="2024-04-12T21:31:18.702895849Z" level=info msg="CreateContainer within sandbox \"ffba5fa63d0571087a01f464fb5596f01ee49914737be0526ebd22fe43bf98cc\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3bad7dfcf33a86d2fb960506ab64b759ce7e7d510356fbe600abe74883542653\"" Apr 12 21:31:18.703208 env[1471]: time="2024-04-12T21:31:18.703196603Z" level=info msg="StartContainer for \"3bad7dfcf33a86d2fb960506ab64b759ce7e7d510356fbe600abe74883542653\"" Apr 12 21:31:18.712852 systemd[1]: Started cri-containerd-3bad7dfcf33a86d2fb960506ab64b759ce7e7d510356fbe600abe74883542653.scope. Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit: BPF prog-id=188 op=LOAD Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=5523 pid=5615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:18.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616437646663663333613836643266623936303530366162363462 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=5523 pid=5615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:18.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616437646663663333613836643266623936303530366162363462 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.717000 audit: BPF prog-id=189 op=LOAD Apr 12 21:31:18.717000 audit[5615]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001e79a0 items=0 ppid=5523 pid=5615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:18.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616437646663663333613836643266623936303530366162363462 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit: BPF prog-id=190 op=LOAD Apr 12 21:31:18.718000 audit[5615]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001e79e8 items=0 ppid=5523 pid=5615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:18.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616437646663663333613836643266623936303530366162363462 Apr 12 21:31:18.718000 audit: BPF prog-id=190 op=UNLOAD Apr 12 21:31:18.718000 audit: BPF prog-id=189 op=UNLOAD Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { perfmon } for pid=5615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit[5615]: AVC avc: denied { bpf } for pid=5615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:18.718000 audit: BPF prog-id=191 op=LOAD Apr 12 21:31:18.718000 audit[5615]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001e7df8 items=0 ppid=5523 pid=5615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:18.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616437646663663333613836643266623936303530366162363462 Apr 12 21:31:18.735977 env[1471]: time="2024-04-12T21:31:18.735949641Z" level=info msg="StartContainer for \"3bad7dfcf33a86d2fb960506ab64b759ce7e7d510356fbe600abe74883542653\" returns successfully" Apr 12 21:31:19.065491 env[1471]: time="2024-04-12T21:31:19.065441648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:19.066094 env[1471]: time="2024-04-12T21:31:19.066054614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:19.066681 env[1471]: time="2024-04-12T21:31:19.066641981Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:19.067646 env[1471]: time="2024-04-12T21:31:19.067607663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:31:19.067860 env[1471]: time="2024-04-12T21:31:19.067813794Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 21:31:19.069545 env[1471]: time="2024-04-12T21:31:19.069512668Z" level=info msg="CreateContainer within sandbox \"aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 21:31:19.074965 env[1471]: time="2024-04-12T21:31:19.074917154Z" level=info msg="CreateContainer within sandbox \"aea21c76476101d565511615f20f9daf03bb76503274a3aac9595a9a32856bf0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9b0f6fb1b838fc97447c1bcdcb045a437a2473a7bfece518db9e945d6ae8255a\"" Apr 12 21:31:19.075232 env[1471]: time="2024-04-12T21:31:19.075221597Z" level=info msg="StartContainer for \"9b0f6fb1b838fc97447c1bcdcb045a437a2473a7bfece518db9e945d6ae8255a\"" Apr 12 21:31:19.083140 systemd[1]: Started cri-containerd-9b0f6fb1b838fc97447c1bcdcb045a437a2473a7bfece518db9e945d6ae8255a.scope. Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit: BPF prog-id=192 op=LOAD Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5568 pid=5671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306636666231623833386663393734343763316263646362303435 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5568 pid=5671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306636666231623833386663393734343763316263646362303435 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.089000 audit: BPF prog-id=193 op=LOAD Apr 12 21:31:19.089000 audit[5671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030e4c0 items=0 ppid=5568 pid=5671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306636666231623833386663393734343763316263646362303435 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit: BPF prog-id=194 op=LOAD Apr 12 21:31:19.090000 audit[5671]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030e508 items=0 ppid=5568 pid=5671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306636666231623833386663393734343763316263646362303435 Apr 12 21:31:19.090000 audit: BPF prog-id=194 op=UNLOAD Apr 12 21:31:19.090000 audit: BPF prog-id=193 op=UNLOAD Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { perfmon } for pid=5671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit[5671]: AVC avc: denied { bpf } for pid=5671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:31:19.090000 audit: BPF prog-id=195 op=LOAD Apr 12 21:31:19.090000 audit[5671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030e918 items=0 ppid=5568 pid=5671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306636666231623833386663393734343763316263646362303435 Apr 12 21:31:19.108349 env[1471]: time="2024-04-12T21:31:19.108281633Z" level=info msg="StartContainer for \"9b0f6fb1b838fc97447c1bcdcb045a437a2473a7bfece518db9e945d6ae8255a\" returns successfully" Apr 12 21:31:19.281000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:31:19.281000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000552340 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:31:19.281000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:31:19.383000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:31:19.383000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000059260 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:31:19.383000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:31:19.665907 kubelet[2586]: I0412 21:31:19.665850 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fbcf64d75-x9m6k" podStartSLOduration=2.39625703 podCreationTimestamp="2024-04-12 21:31:14 +0000 UTC" firstStartedPulling="2024-04-12 21:31:15.798556805 +0000 UTC m=+70.501033749" lastFinishedPulling="2024-04-12 21:31:19.068023163 +0000 UTC m=+73.770500111" observedRunningTime="2024-04-12 21:31:19.664034439 +0000 UTC m=+74.366511476" watchObservedRunningTime="2024-04-12 21:31:19.665723392 +0000 UTC m=+74.368200389" Apr 12 21:31:19.683650 kubelet[2586]: I0412 21:31:19.683589 2586 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fbcf64d75-qhlgm" podStartSLOduration=2.760071391 podCreationTimestamp="2024-04-12 21:31:14 +0000 UTC" firstStartedPulling="2024-04-12 21:31:15.773958611 +0000 UTC m=+70.476435555" lastFinishedPulling="2024-04-12 21:31:18.697386302 +0000 UTC m=+73.399863255" observedRunningTime="2024-04-12 21:31:19.681900279 +0000 UTC m=+74.384377312" watchObservedRunningTime="2024-04-12 21:31:19.683499091 +0000 UTC m=+74.385976087" Apr 12 21:31:19.685000 audit[5716]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:19.685000 audit[5716]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc811750d0 a2=0 a3=7ffc811750bc items=0 ppid=2812 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:19.687000 audit[5716]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:19.741119 kernel: kauditd_printk_skb: 257 callbacks suppressed Apr 12 21:31:19.741212 kernel: audit: type=1325 audit(1712957479.687:1405): table=nat:118 family=2 entries=20 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:19.687000 audit[5716]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc811750d0 a2=0 a3=7ffc811750bc items=0 ppid=2812 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.798241 kernel: audit: type=1300 audit(1712957479.687:1405): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc811750d0 a2=0 a3=7ffc811750bc items=0 ppid=2812 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:19.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:19.949215 kernel: audit: type=1327 audit(1712957479.687:1405): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:19.949263 kernel: audit: type=1325 audit(1712957479.719:1406): table=filter:119 family=2 entries=10 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:19.719000 audit[5718]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:19.719000 audit[5718]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca069ff80 a2=0 a3=7ffca069ff6c items=0 ppid=2812 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:20.101611 kernel: audit: type=1300 audit(1712957479.719:1406): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca069ff80 a2=0 a3=7ffca069ff6c items=0 ppid=2812 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:20.101650 kernel: audit: type=1327 audit(1712957479.719:1406): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:19.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:19.798000 audit[5718]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:19.798000 audit[5718]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca069ff80 a2=0 a3=7ffca069ff6c items=0 ppid=2812 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:20.310733 kernel: audit: type=1325 audit(1712957479.798:1407): table=nat:120 family=2 entries=20 op=nft_register_rule pid=5718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:20.310764 kernel: audit: type=1300 audit(1712957479.798:1407): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca069ff80 a2=0 a3=7ffca069ff6c items=0 ppid=2812 pid=5718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:20.310782 kernel: audit: type=1327 audit(1712957479.798:1407): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:19.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:45.651000 audit[5836]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=5836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:45.651000 audit[5836]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb2e2de60 a2=0 a3=7ffdb2e2de4c items=0 ppid=2812 pid=5836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:45.806571 kernel: audit: type=1325 audit(1712957505.651:1408): table=filter:121 family=2 entries=9 op=nft_register_rule pid=5836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:45.806653 kernel: audit: type=1300 audit(1712957505.651:1408): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb2e2de60 a2=0 a3=7ffdb2e2de4c items=0 ppid=2812 pid=5836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:45.806688 kernel: audit: type=1327 audit(1712957505.651:1408): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:45.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:45.652000 audit[5836]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=5836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:45.921615 kernel: audit: type=1325 audit(1712957505.652:1409): table=nat:122 family=2 entries=27 op=nft_register_chain pid=5836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:45.921693 kernel: audit: type=1300 audit(1712957505.652:1409): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdb2e2de60 a2=0 a3=7ffdb2e2de4c items=0 ppid=2812 pid=5836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:45.652000 audit[5836]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdb2e2de60 a2=0 a3=7ffdb2e2de4c items=0 ppid=2812 pid=5836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:45.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:46.075345 kernel: audit: type=1327 audit(1712957505.652:1409): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:46.079000 audit[5838]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:46.079000 audit[5838]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffce59da80 a2=0 a3=7fffce59da6c items=0 ppid=2812 pid=5838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:46.237898 kernel: audit: type=1325 audit(1712957506.079:1410): table=filter:123 family=2 entries=8 op=nft_register_rule pid=5838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:46.237945 kernel: audit: type=1300 audit(1712957506.079:1410): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffce59da80 a2=0 a3=7fffce59da6c items=0 ppid=2812 pid=5838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:46.237964 kernel: audit: type=1327 audit(1712957506.079:1410): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:46.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:46.299000 audit[5838]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=5838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:31:46.299000 audit[5838]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffce59da80 a2=0 a3=7fffce59da6c items=0 ppid=2812 pid=5838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:31:46.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:31:46.360468 kernel: audit: type=1325 audit(1712957506.299:1411): table=nat:124 family=2 entries=34 op=nft_register_chain pid=5838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:32:01.757000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.786441 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:32:01.786537 kernel: audit: type=1400 audit(1712957521.757:1412): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.757000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c011653230 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.879315 kernel: audit: type=1300 audit(1712957521.757:1412): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c011653230 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:02.072840 kernel: audit: type=1327 audit(1712957521.757:1412): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:02.072875 kernel: audit: type=1400 audit(1712957521.757:1413): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.757000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:02.165765 kernel: audit: type=1300 audit(1712957521.757:1413): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00a1179b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.757000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00a1179b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:02.264648 kernel: audit: type=1327 audit(1712957521.757:1413): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:01.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:02.358312 kernel: audit: type=1400 audit(1712957521.757:1414): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.757000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:02.448863 kernel: audit: type=1300 audit(1712957521.757:1414): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003b36320 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.757000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003b36320 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:02.547977 kernel: audit: type=1327 audit(1712957521.757:1414): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:01.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:02.643088 kernel: audit: type=1400 audit(1712957521.771:1415): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f368dc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a117a40 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:01.774000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:01.774000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0133f77d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:32:01.774000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:32:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017f2d80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e61900 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:18.636000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:18.664217 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:32:18.664334 kernel: audit: type=1400 audit(1712957538.636:1420): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:18.636000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000824ee0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:18.874888 kernel: audit: type=1300 audit(1712957538.636:1420): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000824ee0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:18.874934 kernel: audit: type=1327 audit(1712957538.636:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:18.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:18.967551 kernel: audit: type=1400 audit(1712957538.638:1421): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:18.638000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:19.057002 kernel: audit: type=1300 audit(1712957538.638:1421): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25a60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:18.638000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25a60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:19.177013 kernel: audit: type=1327 audit(1712957538.638:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:18.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:19.270408 kernel: audit: type=1400 audit(1712957538.641:1422): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:19.360770 kernel: audit: type=1300 audit(1712957538.641:1422): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000825260 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000825260 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:19.481486 kernel: audit: type=1327 audit(1712957538.641:1422): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:19.574976 kernel: audit: type=1400 audit(1712957538.643:1423): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:32:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25c00 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:32:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:32:19.282000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:32:19.282000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00032eda0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:32:19.282000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:32:19.384000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:32:19.384000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009cb160 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:32:19.384000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:33:01.758000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.787269 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:33:01.787339 kernel: audit: type=1400 audit(1712957581.758:1426): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.758000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.969464 kernel: audit: type=1400 audit(1712957581.758:1427): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.969534 kernel: audit: type=1400 audit(1712957581.758:1428): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.758000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:02.061110 kernel: audit: type=1300 audit(1712957581.758:1427): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0093448d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:01.758000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0093448d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:02.160142 kernel: audit: type=1300 audit(1712957581.758:1426): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c005649540 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:01.758000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c005649540 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:02.258754 kernel: audit: type=1327 audit(1712957581.758:1426): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:01.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:02.352179 kernel: audit: type=1300 audit(1712957581.758:1428): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c004580f00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:01.758000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c004580f00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:02.450639 kernel: audit: type=1327 audit(1712957581.758:1427): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:01.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:01.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:02.637469 kernel: audit: type=1327 audit(1712957581.758:1428): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:02.637504 kernel: audit: type=1400 audit(1712957581.772:1429): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0048be1c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a58ecc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:01.774000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:01.774000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0086d6750 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:33:01.774000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:33:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010389f0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea3420 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:18.635000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:18.664847 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:33:18.664957 kernel: audit: type=1400 audit(1712957598.635:1434): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:18.635000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002405340 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:18.875303 kernel: audit: type=1300 audit(1712957598.635:1434): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002405340 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:18.875344 kernel: audit: type=1327 audit(1712957598.635:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:18.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:18.638000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:19.057178 kernel: audit: type=1400 audit(1712957598.638:1435): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:19.057228 kernel: audit: type=1300 audit(1712957598.638:1435): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277b1a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:18.638000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277b1a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:19.177383 kernel: audit: type=1327 audit(1712957598.638:1435): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:18.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:19.270791 kernel: audit: type=1400 audit(1712957598.641:1436): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:19.361100 kernel: audit: type=1300 audit(1712957598.641:1436): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026421e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026421e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:19.481730 kernel: audit: type=1327 audit(1712957598.641:1436): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:19.575058 kernel: audit: type=1400 audit(1712957598.643:1437): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:33:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b02e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:33:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:33:19.282000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:33:19.282000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a540c0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:33:19.282000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:33:19.383000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:33:19.383000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f1e7e0 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:33:19.383000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:34:01.759000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.787964 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:34:01.788210 kernel: audit: type=1400 audit(1712957641.759:1440): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.759000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00f9642c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.978150 kernel: audit: type=1300 audit(1712957641.759:1440): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00f9642c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.978185 kernel: audit: type=1327 audit(1712957641.759:1440): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:01.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:02.070661 kernel: audit: type=1400 audit(1712957641.759:1441): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.759000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:02.161123 kernel: audit: type=1300 audit(1712957641.759:1441): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0133f7410 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.759000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0133f7410 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:02.259534 kernel: audit: type=1327 audit(1712957641.759:1441): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:01.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:02.352805 kernel: audit: type=1400 audit(1712957641.759:1442): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.759000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:02.443502 kernel: audit: type=1300 audit(1712957641.759:1442): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0096e0c60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.759000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0096e0c60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:02.542017 kernel: audit: type=1327 audit(1712957641.759:1442): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:01.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:02.635300 kernel: audit: type=1400 audit(1712957641.772:1443): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0098859c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c008836b10 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:01.774000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:01.774000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0082f2060 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:34:01.774000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:34:02.018000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:02.018000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022125c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:02.018000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:02.018000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:02.018000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002301e90 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:02.018000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:18.636000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:18.664598 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:34:18.664639 kernel: audit: type=1400 audit(1712957658.636:1448): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:18.636000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277aa40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:18.877725 kernel: audit: type=1300 audit(1712957658.636:1448): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277aa40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:18.877778 kernel: audit: type=1327 audit(1712957658.636:1448): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:18.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:18.971080 kernel: audit: type=1400 audit(1712957658.639:1449): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:18.639000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:19.060618 kernel: audit: type=1300 audit(1712957658.639:1449): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002213cc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:18.639000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002213cc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:19.180614 kernel: audit: type=1327 audit(1712957658.639:1449): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:18.639000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:19.364158 kernel: audit: type=1400 audit(1712957658.641:1450): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:19.364212 kernel: audit: type=1300 audit(1712957658.641:1450): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120fa40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120fa40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:19.484786 kernel: audit: type=1327 audit(1712957658.641:1450): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:19.578232 kernel: audit: type=1400 audit(1712957658.643:1451): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:34:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002404940 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:34:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:34:19.282000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:34:19.282000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005522e0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:34:19.282000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:34:19.384000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:34:19.384000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001141a0 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:34:19.384000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:35:01.760000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.802558 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:35:01.802709 kernel: audit: type=1400 audit(1712957701.760:1454): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.760000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0097affa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:01.991679 kernel: audit: type=1300 audit(1712957701.760:1454): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0097affa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:01.991727 kernel: audit: type=1327 audit(1712957701.760:1454): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:01.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:02.084159 kernel: audit: type=1400 audit(1712957701.760:1455): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.760000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.760000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c015024cf0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:02.273117 kernel: audit: type=1300 audit(1712957701.760:1455): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c015024cf0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:02.273152 kernel: audit: type=1327 audit(1712957701.760:1455): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:01.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:02.366398 kernel: audit: type=1400 audit(1712957701.760:1456): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.760000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:02.457017 kernel: audit: type=1300 audit(1712957701.760:1456): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009063a70 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:01.760000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009063a70 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:02.555495 kernel: audit: type=1327 audit(1712957701.760:1456): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:01.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:02.648872 kernel: audit: type=1400 audit(1712957701.773:1457): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008871fc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c013b305d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:01.776000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:01.776000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c015024e10 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:35:01.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:35:02.020000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:02.020000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cfb5c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:02.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:02.020000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:02.020000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027b1ce0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:02.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:18.637000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:18.664915 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:35:18.664958 kernel: audit: type=1400 audit(1712957718.637:1462): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:18.637000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001029500 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.877144 kernel: audit: type=1300 audit(1712957718.637:1462): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001029500 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.877204 kernel: audit: type=1327 audit(1712957718.637:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:18.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:18.640000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:19.058862 kernel: audit: type=1400 audit(1712957718.640:1463): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:19.058898 kernel: audit: type=1300 audit(1712957718.640:1463): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f7cc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.640000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f7cc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:19.272048 kernel: audit: type=1327 audit(1712957718.640:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:19.272086 kernel: audit: type=1400 audit(1712957718.643:1464): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:19.362292 kernel: audit: type=1300 audit(1712957718.643:1464): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e616c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e616c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:19.576237 kernel: audit: type=1327 audit(1712957718.643:1464): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:19.576301 kernel: audit: type=1400 audit(1712957718.645:1465): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:18.645000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:35:18.645000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001029700 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:35:18.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:35:19.284000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:35:19.284000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c32ce0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:35:19.284000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:35:19.386000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:35:19.386000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000114600 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:35:19.386000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:35:27.707987 systemd[1]: Started sshd@7-139.178.89.153:22-14.50.37.8:56220.service. Apr 12 21:35:27.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.153:22-14.50.37.8:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:27.727798 systemd[1]: Started sshd@8-139.178.89.153:22-14.50.37.8:56222.service. Apr 12 21:35:27.734944 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:35:27.735010 kernel: audit: type=1130 audit(1712957727.707:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.153:22-14.50.37.8:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:27.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.153:22-14.50.37.8:56222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:27.913041 kernel: audit: type=1130 audit(1712957727.727:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.153:22-14.50.37.8:56222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:28.450463 sshd[6706]: Invalid user pi from 14.50.37.8 port 56222 Apr 12 21:35:28.496266 sshd[6703]: Invalid user pi from 14.50.37.8 port 56220 Apr 12 21:35:28.581951 sshd[6706]: pam_faillock(sshd:auth): User unknown Apr 12 21:35:28.583011 sshd[6706]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:35:28.583161 sshd[6706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.50.37.8 Apr 12 21:35:28.584253 sshd[6706]: pam_faillock(sshd:auth): User unknown Apr 12 21:35:28.584000 audit[6706]: USER_AUTH pid=6706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=14.50.37.8 addr=14.50.37.8 terminal=ssh res=failed' Apr 12 21:35:28.646096 sshd[6703]: pam_faillock(sshd:auth): User unknown Apr 12 21:35:28.646306 sshd[6703]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:35:28.646339 sshd[6703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.50.37.8 Apr 12 21:35:28.646551 sshd[6703]: pam_faillock(sshd:auth): User unknown Apr 12 21:35:28.646000 audit[6703]: USER_AUTH pid=6703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=14.50.37.8 addr=14.50.37.8 terminal=ssh res=failed' Apr 12 21:35:28.763223 kernel: audit: type=1100 audit(1712957728.584:1470): pid=6706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=14.50.37.8 addr=14.50.37.8 terminal=ssh res=failed' Apr 12 21:35:28.763263 kernel: audit: type=1100 audit(1712957728.646:1471): pid=6703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=14.50.37.8 addr=14.50.37.8 terminal=ssh res=failed' Apr 12 21:35:29.950453 sshd[6706]: Failed password for invalid user pi from 14.50.37.8 port 56222 ssh2 Apr 12 21:35:30.012530 sshd[6703]: Failed password for invalid user pi from 14.50.37.8 port 56220 ssh2 Apr 12 21:35:30.433574 sshd[6706]: Connection closed by invalid user pi 14.50.37.8 port 56222 [preauth] Apr 12 21:35:30.436214 systemd[1]: sshd@8-139.178.89.153:22-14.50.37.8:56222.service: Deactivated successfully. Apr 12 21:35:30.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.153:22-14.50.37.8:56222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:30.510496 sshd[6703]: Connection closed by invalid user pi 14.50.37.8 port 56220 [preauth] Apr 12 21:35:30.511099 systemd[1]: sshd@7-139.178.89.153:22-14.50.37.8:56220.service: Deactivated successfully. Apr 12 21:35:30.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.153:22-14.50.37.8:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:30.619384 kernel: audit: type=1131 audit(1712957730.436:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.153:22-14.50.37.8:56222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:35:30.619416 kernel: audit: type=1131 audit(1712957730.510:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.153:22-14.50.37.8:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:36:01.760000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.760000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009fe59b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.953673 kernel: audit: type=1400 audit(1712957761.760:1474): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.953722 kernel: audit: type=1300 audit(1712957761.760:1474): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009fe59b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.953741 kernel: audit: type=1327 audit(1712957761.760:1474): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:01.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:02.047150 kernel: audit: type=1400 audit(1712957761.760:1475): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.760000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:02.138470 kernel: audit: type=1300 audit(1712957761.760:1475): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008586ab0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.760000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008586ab0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:02.237021 kernel: audit: type=1327 audit(1712957761.760:1475): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:01.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:02.330574 kernel: audit: type=1400 audit(1712957761.760:1476): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.760000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:02.420846 kernel: audit: type=1300 audit(1712957761.760:1476): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008fb9a40 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.760000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008fb9a40 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:02.519481 kernel: audit: type=1327 audit(1712957761.760:1476): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:01.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:02.612915 kernel: audit: type=1400 audit(1712957761.773:1477): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0084255a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0116537d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:01.776000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:01.776000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008586ba0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:36:01.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:36:02.019000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:02.019000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25e60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:02.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:02.019000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:02.019000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006a7980 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:02.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:18.637000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:18.665773 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:36:18.665816 kernel: audit: type=1400 audit(1712957778.637:1482): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:18.637000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002643a20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:18.880072 kernel: audit: type=1300 audit(1712957778.637:1482): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002643a20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:18.880107 kernel: audit: type=1327 audit(1712957778.637:1482): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:18.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:18.973477 kernel: audit: type=1400 audit(1712957778.639:1483): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:18.639000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:19.063724 kernel: audit: type=1300 audit(1712957778.639:1483): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022134a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:18.639000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022134a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:19.184308 kernel: audit: type=1327 audit(1712957778.639:1483): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:18.639000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:19.277642 kernel: audit: type=1400 audit(1712957778.642:1484): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:18.642000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:19.367828 kernel: audit: type=1300 audit(1712957778.642:1484): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022134c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:18.642000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022134c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:19.488597 kernel: audit: type=1327 audit(1712957778.642:1484): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:18.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:19.582035 kernel: audit: type=1400 audit(1712957778.644:1485): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:18.644000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:36:18.644000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120ee40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:36:18.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:36:19.283000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:36:19.283000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000552260 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:36:19.283000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:36:19.386000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:36:19.386000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b2ca20 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:36:19.386000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:37:01.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.789934 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:37:01.790021 kernel: audit: type=1400 audit(1712957821.761:1488): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.761000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c016a57080 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.978415 kernel: audit: type=1300 audit(1712957821.761:1488): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c016a57080 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.978488 kernel: audit: type=1327 audit(1712957821.761:1488): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:01.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:02.070934 kernel: audit: type=1400 audit(1712957821.761:1489): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:02.161405 kernel: audit: type=1300 audit(1712957821.761:1489): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008e39110 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.761000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c008e39110 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:02.260320 kernel: audit: type=1327 audit(1712957821.761:1489): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:01.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:02.445807 kernel: audit: type=1400 audit(1712957821.761:1490): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:02.445873 kernel: audit: type=1300 audit(1712957821.761:1490): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0115c6000 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.761000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0115c6000 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:02.637654 kernel: audit: type=1327 audit(1712957821.761:1490): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:02.637712 kernel: audit: type=1400 audit(1712957821.773:1491): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0113b97c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c016a570b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:01.778000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:01.778000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0066fa540 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:37:01.778000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:37:02.020000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:02.020000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b13c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:02.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:02.020000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:02.020000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00280dbc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:02.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:18.638000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:18.666689 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:37:18.666791 kernel: audit: type=1400 audit(1712957838.638:1496): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:18.638000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8eee0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:18.879587 kernel: audit: type=1300 audit(1712957838.638:1496): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8eee0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:18.879673 kernel: audit: type=1327 audit(1712957838.638:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:18.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:18.640000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:19.061307 kernel: audit: type=1400 audit(1712957838.640:1497): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:19.061368 kernel: audit: type=1300 audit(1712957838.640:1497): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cbc460 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:18.640000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cbc460 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:18.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:19.274552 kernel: audit: type=1327 audit(1712957838.640:1497): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:19.274637 kernel: audit: type=1400 audit(1712957838.643:1498): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f42fc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:19.485466 kernel: audit: type=1300 audit(1712957838.643:1498): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f42fc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:19.485531 kernel: audit: type=1327 audit(1712957838.643:1498): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:18.645000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:19.669164 kernel: audit: type=1400 audit(1712957838.645:1499): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:37:18.645000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8f3e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:37:18.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:37:19.284000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:37:19.284000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000552400 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:37:19.284000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:37:19.387000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:37:19.387000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000115120 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:37:19.387000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:38:01.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.790447 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:38:01.790508 kernel: audit: type=1400 audit(1712957881.761:1502): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.761000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a461dc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:01.979050 kernel: audit: type=1300 audit(1712957881.761:1502): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a461dc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:01.979108 kernel: audit: type=1327 audit(1712957881.761:1502): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:02.164318 kernel: audit: type=1400 audit(1712957881.761:1503): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:02.164377 kernel: audit: type=1400 audit(1712957881.761:1504): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.761000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.761000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0084efa10 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:02.354076 kernel: audit: type=1300 audit(1712957881.761:1503): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0084efa10 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:02.354145 kernel: audit: type=1327 audit(1712957881.761:1503): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.761000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00817f590 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:02.545797 kernel: audit: type=1300 audit(1712957881.761:1504): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00817f590 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:02.545857 kernel: audit: type=1327 audit(1712957881.761:1504): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.761000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:02.730698 kernel: audit: type=1400 audit(1712957881.773:1505): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01261bce0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.773000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.773000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003b36080 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:01.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:01.779000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:01.779000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a116f00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:38:01.779000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:38:02.017000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:02.017000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d24c20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:02.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:02.021000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:02.021000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001e68300 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:02.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:18.639000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:18.667823 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:38:18.667977 kernel: audit: type=1400 audit(1712957898.639:1510): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:18.639000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25d60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:18.879566 kernel: audit: type=1300 audit(1712957898.639:1510): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25d60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:18.879635 kernel: audit: type=1327 audit(1712957898.639:1510): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:18.639000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:19.061327 kernel: audit: type=1400 audit(1712957898.641:1511): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:19.061386 kernel: audit: type=1300 audit(1712957898.641:1511): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001028de0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001028de0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:19.274594 kernel: audit: type=1327 audit(1712957898.641:1511): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:19.274640 kernel: audit: type=1400 audit(1712957898.644:1512): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:18.644000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:18.644000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25f40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:19.485415 kernel: audit: type=1300 audit(1712957898.644:1512): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25f40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:19.485477 kernel: audit: type=1327 audit(1712957898.644:1512): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:18.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:19.669082 kernel: audit: type=1400 audit(1712957898.646:1513): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:38:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010290a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:38:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:38:19.284000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:38:19.284000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005c4680 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:38:19.284000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:38:19.388000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:38:19.388000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00109b180 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:38:19.388000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:39:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.792022 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:39:01.792060 kernel: audit: type=1400 audit(1712957941.763:1516): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a008600 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.982319 kernel: audit: type=1300 audit(1712957941.763:1516): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a008600 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.982394 kernel: audit: type=1327 audit(1712957941.763:1516): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:02.074764 kernel: audit: type=1400 audit(1712957941.763:1517): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:02.165226 kernel: audit: type=1300 audit(1712957941.763:1517): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a008660 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a008660 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:02.263769 kernel: audit: type=1327 audit(1712957941.763:1517): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:02.357013 kernel: audit: type=1400 audit(1712957941.763:1518): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:02.447010 kernel: audit: type=1300 audit(1712957941.763:1518): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00f244ec0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00f244ec0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:02.545408 kernel: audit: type=1327 audit(1712957941.763:1518): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:02.638608 kernel: audit: type=1400 audit(1712957941.775:1519): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.775000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.775000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c1ba520 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.775000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:01.776000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.776000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0142fad50 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:01.780000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:01.780000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0119bba10 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:39:01.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:39:02.023000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:02.023000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcbc80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:02.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:02.023000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:02.023000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc8c80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:02.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:14.046480 update_engine[1461]: I0412 21:39:14.046355 1461 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 21:39:14.046480 update_engine[1461]: I0412 21:39:14.046437 1461 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 21:39:14.047757 update_engine[1461]: I0412 21:39:14.047540 1461 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 21:39:14.048553 update_engine[1461]: I0412 21:39:14.048471 1461 omaha_request_params.cc:62] Current group set to lts Apr 12 21:39:14.048838 update_engine[1461]: I0412 21:39:14.048753 1461 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 21:39:14.048838 update_engine[1461]: I0412 21:39:14.048772 1461 update_attempter.cc:643] Scheduling an action processor start. Apr 12 21:39:14.048838 update_engine[1461]: I0412 21:39:14.048806 1461 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 21:39:14.049176 update_engine[1461]: I0412 21:39:14.048878 1461 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 21:39:14.049176 update_engine[1461]: I0412 21:39:14.049022 1461 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 21:39:14.049176 update_engine[1461]: I0412 21:39:14.049039 1461 omaha_request_action.cc:271] Request: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: Apr 12 21:39:14.049176 update_engine[1461]: I0412 21:39:14.049050 1461 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:39:14.050461 locksmithd[1504]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 21:39:14.052182 update_engine[1461]: I0412 21:39:14.052100 1461 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:39:14.052411 update_engine[1461]: E0412 21:39:14.052368 1461 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:39:14.052440 update_engine[1461]: I0412 21:39:14.052431 1461 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 21:39:18.639000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:18.684252 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:39:18.684349 kernel: audit: type=1400 audit(1712957958.639:1524): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:18.639000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc98a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:18.895616 kernel: audit: type=1300 audit(1712957958.639:1524): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc98a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:18.895671 kernel: audit: type=1327 audit(1712957958.639:1524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:18.639000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:18.987952 kernel: audit: type=1400 audit(1712957958.642:1525): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:18.642000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:19.077325 kernel: audit: type=1300 audit(1712957958.642:1525): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b01e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:18.642000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b01e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:19.197311 kernel: audit: type=1327 audit(1712957958.642:1525): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:18.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:19.290631 kernel: audit: type=1400 audit(1712957958.644:1526): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:18.644000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:19.380863 kernel: audit: type=1300 audit(1712957958.644:1526): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc9a60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:18.644000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc9a60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:19.501495 kernel: audit: type=1327 audit(1712957958.644:1526): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:18.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:19.595026 kernel: audit: type=1400 audit(1712957958.646:1527): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:39:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b03e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:39:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:39:19.285000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:39:19.285000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c32f60 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:39:19.285000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:39:19.389000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:39:19.389000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00047ef20 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:39:19.389000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:39:23.989593 update_engine[1461]: I0412 21:39:23.989477 1461 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:39:23.990466 update_engine[1461]: I0412 21:39:23.989950 1461 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:39:23.990466 update_engine[1461]: E0412 21:39:23.990157 1461 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:39:23.990466 update_engine[1461]: I0412 21:39:23.990365 1461 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 21:39:33.989617 update_engine[1461]: I0412 21:39:33.989485 1461 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:39:33.990547 update_engine[1461]: I0412 21:39:33.989972 1461 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:39:33.990547 update_engine[1461]: E0412 21:39:33.990180 1461 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:39:33.990547 update_engine[1461]: I0412 21:39:33.990377 1461 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 21:39:43.988439 update_engine[1461]: I0412 21:39:43.988317 1461 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.988778 1461 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:39:43.989589 update_engine[1461]: E0412 21:39:43.988989 1461 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989140 1461 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989156 1461 omaha_request_action.cc:621] Omaha request response: Apr 12 21:39:43.989589 update_engine[1461]: E0412 21:39:43.989323 1461 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989353 1461 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989363 1461 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989375 1461 update_attempter.cc:306] Processing Done. Apr 12 21:39:43.989589 update_engine[1461]: E0412 21:39:43.989400 1461 update_attempter.cc:619] Update failed. Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989410 1461 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989418 1461 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989427 1461 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 21:39:43.989589 update_engine[1461]: I0412 21:39:43.989578 1461 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.989629 1461 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.989640 1461 omaha_request_action.cc:271] Request: Apr 12 21:39:43.990831 update_engine[1461]: Apr 12 21:39:43.990831 update_engine[1461]: Apr 12 21:39:43.990831 update_engine[1461]: Apr 12 21:39:43.990831 update_engine[1461]: Apr 12 21:39:43.990831 update_engine[1461]: Apr 12 21:39:43.990831 update_engine[1461]: Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.989650 1461 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.989962 1461 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:39:43.990831 update_engine[1461]: E0412 21:39:43.990124 1461 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990273 1461 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990289 1461 omaha_request_action.cc:621] Omaha request response: Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990300 1461 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990309 1461 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990317 1461 update_attempter.cc:306] Processing Done. Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990324 1461 update_attempter.cc:310] Error event sent. Apr 12 21:39:43.990831 update_engine[1461]: I0412 21:39:43.990345 1461 update_check_scheduler.cc:74] Next update check in 49m36s Apr 12 21:39:43.992531 locksmithd[1504]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 21:39:43.992531 locksmithd[1504]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 21:40:01.762000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.792491 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:40:01.792597 kernel: audit: type=1400 audit(1712958001.762:1530): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.762000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00424b830 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.981192 kernel: audit: type=1300 audit(1712958001.762:1530): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00424b830 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.981228 kernel: audit: type=1327 audit(1712958001.762:1530): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:01.762000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:02.073699 kernel: audit: type=1400 audit(1712958001.763:1531): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:02.163060 kernel: audit: type=1300 audit(1712958001.763:1531): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c016fa0da0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c016fa0da0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:02.261545 kernel: audit: type=1327 audit(1712958001.763:1531): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:02.354811 kernel: audit: type=1400 audit(1712958001.763:1532): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:02.445546 kernel: audit: type=1300 audit(1712958001.763:1532): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007411b60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007411b60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:02.544045 kernel: audit: type=1327 audit(1712958001.763:1532): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:02.637318 kernel: audit: type=1400 audit(1712958001.774:1533): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.774000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.774000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012429be0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.774000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:01.775000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.775000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0084eecf0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.775000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:01.779000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:01.779000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0084eee10 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:40:01.779000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:40:02.022000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:02.022000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002643480 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:02.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:02.022000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:02.022000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00238a6c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:02.022000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:18.669179 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:40:18.669262 kernel: audit: type=1400 audit(1712958018.641:1538): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008a64c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:18.880840 kernel: audit: type=1300 audit(1712958018.641:1538): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008a64c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:18.880880 kernel: audit: type=1327 audit(1712958018.641:1538): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:18.973210 kernel: audit: type=1400 audit(1712958018.643:1539): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:19.062719 kernel: audit: type=1300 audit(1712958018.643:1539): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008a6500 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008a6500 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:19.182700 kernel: audit: type=1327 audit(1712958018.643:1539): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:19.276076 kernel: audit: type=1400 audit(1712958018.646:1540): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:19.366316 kernel: audit: type=1300 audit(1712958018.646:1540): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013281e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013281e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:19.487025 kernel: audit: type=1327 audit(1712958018.646:1540): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:19.580545 kernel: audit: type=1400 audit(1712958018.648:1541): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:18.648000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:40:18.648000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277ac20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:40:18.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:40:19.287000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:40:19.287000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010861a0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:40:19.287000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:40:19.390000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:40:19.390000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b2d000 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:40:19.390000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:40:45.633508 systemd[1]: run-containerd-runc-k8s.io-3bad7dfcf33a86d2fb960506ab64b759ce7e7d510356fbe600abe74883542653-runc.50StDt.mount: Deactivated successfully. Apr 12 21:41:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.792661 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:41:01.792701 kernel: audit: type=1400 audit(1712958061.763:1544): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c010f14360 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.980317 kernel: audit: type=1300 audit(1712958061.763:1544): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c010f14360 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.980348 kernel: audit: type=1327 audit(1712958061.763:1544): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:02.072782 kernel: audit: type=1400 audit(1712958061.763:1545): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:02.162841 kernel: audit: type=1400 audit(1712958061.763:1546): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.763000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:02.254150 kernel: audit: type=1300 audit(1712958061.763:1545): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0092009c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0092009c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:02.352597 kernel: audit: type=1300 audit(1712958061.763:1546): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006d5be00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.763000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006d5be00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:02.451056 kernel: audit: type=1327 audit(1712958061.763:1545): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:02.544482 kernel: audit: type=1327 audit(1712958061.763:1546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:01.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:02.637784 kernel: audit: type=1400 audit(1712958061.776:1547): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.776000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.776000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a1c8ea0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:01.776000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.776000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012429bc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:01.780000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:01.780000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00837dd40 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:41:01.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:41:02.023000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:02.023000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcb110 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:02.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:02.023000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:02.023000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120ee80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:02.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:18.669253 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:41:18.669295 kernel: audit: type=1400 audit(1712958078.641:1552): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002405540 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:18.881135 kernel: audit: type=1300 audit(1712958078.641:1552): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002405540 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:18.881173 kernel: audit: type=1327 audit(1712958078.641:1552): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:18.973523 kernel: audit: type=1400 audit(1712958078.643:1553): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:19.062955 kernel: audit: type=1300 audit(1712958078.643:1553): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264fe60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264fe60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:19.183105 kernel: audit: type=1327 audit(1712958078.643:1553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:19.276560 kernel: audit: type=1400 audit(1712958078.646:1554): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:19.366807 kernel: audit: type=1300 audit(1712958078.646:1554): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024056e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024056e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:19.487493 kernel: audit: type=1327 audit(1712958078.646:1554): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:19.580932 kernel: audit: type=1400 audit(1712958078.647:1555): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:18.647000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:41:18.647000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc8040 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:41:18.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:41:19.287000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:41:19.287000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005c4ec0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:41:19.287000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:41:19.390000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:41:19.390000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00047efa0 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:41:19.390000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:42:01.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.793719 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:42:01.793813 kernel: audit: type=1400 audit(1712958121.764:1558): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.764000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009325980 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:01.982778 kernel: audit: type=1300 audit(1712958121.764:1558): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009325980 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:01.982824 kernel: audit: type=1327 audit(1712958121.764:1558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:01.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:02.076644 kernel: audit: type=1400 audit(1712958121.764:1559): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.764000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:02.167447 kernel: audit: type=1300 audit(1712958121.764:1559): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0079967b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:01.764000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0079967b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:02.265963 kernel: audit: type=1327 audit(1712958121.764:1559): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:01.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:02.359328 kernel: audit: type=1400 audit(1712958121.765:1560): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.765000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.765000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006e30660 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:02.548761 kernel: audit: type=1300 audit(1712958121.765:1560): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006e30660 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:02.548794 kernel: audit: type=1327 audit(1712958121.765:1560): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:01.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:02.642414 kernel: audit: type=1400 audit(1712958121.776:1561): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.776000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.776000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00efa9580 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:01.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:01.777000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.777000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006e30720 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:01.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007996b40 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:42:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:42:02.023000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:02.023000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002405800 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:02.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:02.023000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:02.023000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a0fec0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:02.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:18.641000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:18.687003 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:42:18.687104 kernel: audit: type=1400 audit(1712958138.641:1566): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:18.641000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8e460 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:18.897176 kernel: audit: type=1300 audit(1712958138.641:1566): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8e460 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:18.897213 kernel: audit: type=1327 audit(1712958138.641:1566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:18.641000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:18.989421 kernel: audit: type=1400 audit(1712958138.644:1567): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:18.644000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:19.078853 kernel: audit: type=1300 audit(1712958138.644:1567): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b1b20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:18.644000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027b1b20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:19.198672 kernel: audit: type=1327 audit(1712958138.644:1567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:18.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:19.291899 kernel: audit: type=1400 audit(1712958138.647:1568): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:18.647000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:19.382058 kernel: audit: type=1300 audit(1712958138.647:1568): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f6be0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:18.647000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f6be0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:19.502610 kernel: audit: type=1327 audit(1712958138.647:1568): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:18.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:19.596066 kernel: audit: type=1400 audit(1712958138.648:1569): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:18.648000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:42:18.648000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8e960 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:42:18.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:42:19.287000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:42:19.287000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005530c0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:42:19.287000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:42:19.391000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:42:19.391000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00109a300 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:42:19.391000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:43:01.766000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.794449 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:43:01.794524 kernel: audit: type=1400 audit(1712958181.766:1572): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.766000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009abbfa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.886247 kernel: audit: type=1300 audit(1712958181.766:1572): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009abbfa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:02.076497 kernel: audit: type=1327 audit(1712958181.766:1572): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:02.076535 kernel: audit: type=1400 audit(1712958181.766:1573): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.766000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:02.166970 kernel: audit: type=1300 audit(1712958181.766:1573): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009a11650 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.766000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009a11650 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:02.265463 kernel: audit: type=1327 audit(1712958181.766:1573): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:01.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:02.358702 kernel: audit: type=1400 audit(1712958181.766:1574): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.766000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:02.449361 kernel: audit: type=1300 audit(1712958181.766:1574): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0123de5d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.766000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0123de5d0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:02.547877 kernel: audit: type=1327 audit(1712958181.766:1574): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:01.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:02.641154 kernel: audit: type=1400 audit(1712958181.778:1575): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.778000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.778000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0123de600 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.778000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:01.778000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.778000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009abbfc0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.778000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:01.782000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:01.782000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009a11b90 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:43:01.782000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:43:02.024000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:02.024000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e68720 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:02.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:02.024000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:02.024000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0008a69a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:02.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:18.669884 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:43:18.669944 kernel: audit: type=1400 audit(1712958198.643:1580): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ab9060 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:18.882159 kernel: audit: type=1300 audit(1712958198.643:1580): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ab9060 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:18.882195 kernel: audit: type=1327 audit(1712958198.643:1580): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:18.975032 kernel: audit: type=1400 audit(1712958198.646:1581): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:19.064376 kernel: audit: type=1300 audit(1712958198.646:1581): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264e520 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264e520 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:19.184220 kernel: audit: type=1327 audit(1712958198.646:1581): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:19.277631 kernel: audit: type=1400 audit(1712958198.649:1582): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:19.367747 kernel: audit: type=1300 audit(1712958198.649:1582): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e60220 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e60220 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:19.488325 kernel: audit: type=1327 audit(1712958198.649:1582): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:19.672095 kernel: audit: type=1400 audit(1712958198.649:1583): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:43:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e60260 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:43:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:43:19.289000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:43:19.289000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001086200 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:43:19.289000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:43:19.392000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:43:19.392000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b2c380 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:43:19.392000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:43:51.774635 systemd[1]: Starting systemd-tmpfiles-clean.service... Apr 12 21:43:51.786978 systemd-tmpfiles[8701]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 21:43:51.787209 systemd-tmpfiles[8701]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 21:43:51.787900 systemd-tmpfiles[8701]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 21:43:51.799441 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Apr 12 21:43:51.799542 systemd[1]: Finished systemd-tmpfiles-clean.service. Apr 12 21:43:51.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:43:51.826754 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:43:51.826838 kernel: audit: type=1130 audit(1712958231.798:1586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:43:51.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:43:51.913241 kernel: audit: type=1131 audit(1712958231.798:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:43:51.914790 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Apr 12 21:44:01.765000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.765000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012d9b800 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:01.958698 kernel: audit: type=1400 audit(1712958241.765:1588): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.958780 kernel: audit: type=1300 audit(1712958241.765:1588): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012d9b800 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:01.958798 kernel: audit: type=1327 audit(1712958241.765:1588): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:01.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:02.052043 kernel: audit: type=1400 audit(1712958241.765:1589): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.765000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.765000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0099c0420 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:02.241316 kernel: audit: type=1300 audit(1712958241.765:1589): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0099c0420 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:02.241368 kernel: audit: type=1327 audit(1712958241.765:1589): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:01.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:02.334906 kernel: audit: type=1400 audit(1712958241.765:1590): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.765000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:02.427064 kernel: audit: type=1300 audit(1712958241.765:1590): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005649e00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:01.765000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005649e00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:02.525424 kernel: audit: type=1327 audit(1712958241.765:1590): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:01.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:02.618691 kernel: audit: type=1400 audit(1712958241.777:1591): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.777000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.777000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00865e9c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:01.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:01.777000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.777000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0096b57c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:01.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:01.782000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:01.782000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00865eff0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:44:01.782000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:44:02.024000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:02.024000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264fbc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:02.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:02.024000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:02.024000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011047e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:02.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:18.642000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:18.670884 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:44:18.670923 kernel: audit: type=1400 audit(1712958258.642:1596): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:18.642000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f6fa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:18.883536 kernel: audit: type=1300 audit(1712958258.642:1596): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f6fa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:18.883567 kernel: audit: type=1327 audit(1712958258.642:1596): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:18.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:18.976773 kernel: audit: type=1400 audit(1712958258.645:1597): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:18.645000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:19.067052 kernel: audit: type=1300 audit(1712958258.645:1597): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc8f80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:18.645000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc8f80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:19.187620 kernel: audit: type=1327 audit(1712958258.645:1597): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:18.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:19.281024 kernel: audit: type=1400 audit(1712958258.649:1598): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:19.371319 kernel: audit: type=1300 audit(1712958258.649:1598): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f7140 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019f7140 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:19.492069 kernel: audit: type=1327 audit(1712958258.649:1598): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:19.585504 kernel: audit: type=1400 audit(1712958258.649:1599): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:44:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dc8fa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:44:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:44:19.289000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:44:19.289000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000552320 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:44:19.289000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:44:19.391000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:44:19.391000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b2cda0 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:44:19.391000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:45:01.767000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.796294 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:45:01.796461 kernel: audit: type=1400 audit(1712958301.767:1602): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.767000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009a102a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.985810 kernel: audit: type=1300 audit(1712958301.767:1602): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009a102a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.985850 kernel: audit: type=1327 audit(1712958301.767:1602): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:01.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:01.767000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:02.170282 kernel: audit: type=1400 audit(1712958301.767:1603): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:02.170313 kernel: audit: type=1300 audit(1712958301.767:1603): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0149a3720 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.767000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0149a3720 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:02.268784 kernel: audit: type=1327 audit(1712958301.767:1603): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:01.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:02.362188 kernel: audit: type=1400 audit(1712958301.767:1604): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.767000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:02.452870 kernel: audit: type=1300 audit(1712958301.767:1604): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0167991a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.767000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0167991a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:02.551355 kernel: audit: type=1327 audit(1712958301.767:1604): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:01.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:02.644640 kernel: audit: type=1400 audit(1712958301.778:1605): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.778000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.778000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c011420820 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.778000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:01.778000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.778000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011652a50 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.778000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:01.782000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:01.782000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006902870 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:45:01.782000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:45:02.025000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:02.025000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026431a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:02.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:02.025000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:02.025000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001572900 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:02.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:18.643000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:18.671745 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:45:18.671804 kernel: audit: type=1400 audit(1712958318.643:1610): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:18.643000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013289e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:18.883762 kernel: audit: type=1300 audit(1712958318.643:1610): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013289e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:18.883807 kernel: audit: type=1327 audit(1712958318.643:1610): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:18.643000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:18.647000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:18.647000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8f780 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:19.185624 kernel: audit: type=1400 audit(1712958318.647:1611): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:19.185665 kernel: audit: type=1300 audit(1712958318.647:1611): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b8f780 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:19.185686 kernel: audit: type=1327 audit(1712958318.647:1611): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:18.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:18.650000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:19.370369 kernel: audit: type=1400 audit(1712958318.650:1612): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:19.370404 kernel: audit: type=1300 audit(1712958318.650:1612): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328b80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:18.650000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328b80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:19.491718 kernel: audit: type=1327 audit(1712958318.650:1612): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:18.650000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:19.585089 kernel: audit: type=1400 audit(1712958318.650:1613): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:18.650000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:45:18.650000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001328ba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:45:18.650000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:45:19.290000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:45:19.290000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c323c0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:45:19.290000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:45:19.392000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:45:19.392000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b60760 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:45:19.392000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:46:01.767000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.796590 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:46:01.796653 kernel: audit: type=1400 audit(1712958361.767:1616): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.767000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c016b54cf0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:01.986680 kernel: audit: type=1300 audit(1712958361.767:1616): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c016b54cf0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.986716 kernel: audit: type=1327 audit(1712958361.767:1616): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:01.767000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:02.169049 kernel: audit: type=1400 audit(1712958361.767:1617): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:02.169079 kernel: audit: type=1300 audit(1712958361.767:1617): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007410f30 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.767000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007410f30 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:02.267485 kernel: audit: type=1327 audit(1712958361.767:1617): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:01.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:02.360785 kernel: audit: type=1400 audit(1712958361.768:1618): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.768000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:02.450721 kernel: audit: type=1300 audit(1712958361.768:1618): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0149a2aa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.768000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0149a2aa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:02.549098 kernel: audit: type=1327 audit(1712958361.768:1618): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:01.768000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:02.642317 kernel: audit: type=1400 audit(1712958361.779:1619): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.779000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.779000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c012c8cff0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.779000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:01.779000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.779000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0149a2ae0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.779000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:01.783000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:01.783000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a88af90 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:46:01.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:46:02.025000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:02.025000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d5f020 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:02.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:02.026000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:02.026000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00072bee0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:02.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:18.645000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:18.689294 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:46:18.689385 kernel: audit: type=1400 audit(1712958378.645:1624): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:18.645000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277a060 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:18.900470 kernel: audit: type=1300 audit(1712958378.645:1624): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277a060 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:18.900527 kernel: audit: type=1327 audit(1712958378.645:1624): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:18.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:18.992850 kernel: audit: type=1400 audit(1712958378.648:1625): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:18.648000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:19.082199 kernel: audit: type=1300 audit(1712958378.648:1625): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000824c60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:18.648000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000824c60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:19.202100 kernel: audit: type=1327 audit(1712958378.648:1625): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:18.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:19.295403 kernel: audit: type=1400 audit(1712958378.651:1626): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:18.651000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:19.385570 kernel: audit: type=1300 audit(1712958378.651:1626): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277a240 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:18.651000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277a240 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:19.506185 kernel: audit: type=1327 audit(1712958378.651:1626): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:18.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:19.599490 kernel: audit: type=1400 audit(1712958378.651:1627): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:18.651000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:18.651000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000824c80 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:46:18.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:19.291000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:46:19.291000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005c4e40 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:46:19.291000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:46:19.394000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:46:19.394000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f1f620 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:46:19.394000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:47:01.769000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.797708 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:47:01.797752 kernel: audit: type=1400 audit(1712958421.769:1630): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.769000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a58faa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.985839 kernel: audit: type=1300 audit(1712958421.769:1630): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a58faa0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.985882 kernel: audit: type=1327 audit(1712958421.769:1630): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:01.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:02.079849 kernel: audit: type=1400 audit(1712958421.770:1631): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.770000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:02.169897 kernel: audit: type=1300 audit(1712958421.770:1631): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c010f88c60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.770000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c010f88c60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:02.268324 kernel: audit: type=1327 audit(1712958421.770:1631): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:01.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:02.361558 kernel: audit: type=1400 audit(1712958421.770:1632): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.770000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:02.452169 kernel: audit: type=1300 audit(1712958421.770:1632): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c008068990 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.770000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c008068990 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:02.550950 kernel: audit: type=1327 audit(1712958421.770:1632): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:01.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:02.644616 kernel: audit: type=1400 audit(1712958421.781:1633): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a58fcb0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011602f00 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:01.784000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:01.784000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a58fce0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:47:01.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:47:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002405b20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00219a2d0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:18.645000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:18.673611 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:47:18.673695 kernel: audit: type=1400 audit(1712958438.645:1638): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:18.645000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001028e60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:18.884838 kernel: audit: type=1300 audit(1712958438.645:1638): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001028e60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:18.884873 kernel: audit: type=1327 audit(1712958438.645:1638): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:18.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:18.977153 kernel: audit: type=1400 audit(1712958438.649:1639): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:19.066467 kernel: audit: type=1300 audit(1712958438.649:1639): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002212ca0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002212ca0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:19.186325 kernel: audit: type=1327 audit(1712958438.649:1639): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:19.279594 kernel: audit: type=1400 audit(1712958438.652:1640): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:18.652000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:19.369795 kernel: audit: type=1300 audit(1712958438.652:1640): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001029160 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:18.652000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001029160 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:18.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:19.583640 kernel: audit: type=1327 audit(1712958438.652:1640): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:19.583679 kernel: audit: type=1400 audit(1712958438.652:1641): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:18.652000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:18.652000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010291a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:47:18.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:19.291000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:47:19.291000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005c56c0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:47:19.291000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:47:19.394000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:47:19.394000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b60aa0 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:47:19.394000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:48:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.798703 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:48:01.798781 kernel: audit: type=1400 audit(1712958481.771:1644): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00663d380 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.988477 kernel: audit: type=1300 audit(1712958481.771:1644): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00663d380 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.988511 kernel: audit: type=1327 audit(1712958481.771:1644): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:02.081064 kernel: audit: type=1400 audit(1712958481.771:1645): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:02.170507 kernel: audit: type=1400 audit(1712958481.771:1646): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:02.261785 kernel: audit: type=1300 audit(1712958481.771:1645): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a9b87a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a9b87a0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:02.360203 kernel: audit: type=1327 audit(1712958481.771:1645): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:02.453323 kernel: audit: type=1300 audit(1712958481.771:1646): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00663d3b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00663d3b0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:02.551732 kernel: audit: type=1327 audit(1712958481.771:1646): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:02.644963 kernel: audit: type=1400 audit(1712958481.781:1647): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0167718c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00a9b87c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:01.785000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:01.785000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00663d440 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:48:01.785000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:48:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d24000 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a0ff20 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:18.673378 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:48:18.673424 kernel: audit: type=1400 audit(1712958498.646:1652): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013280a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:18.885035 kernel: audit: type=1300 audit(1712958498.646:1652): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013280a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:18.885070 kernel: audit: type=1327 audit(1712958498.646:1652): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:19.066840 kernel: audit: type=1400 audit(1712958498.649:1653): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:19.066870 kernel: audit: type=1300 audit(1712958498.649:1653): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d253c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d253c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:19.186785 kernel: audit: type=1327 audit(1712958498.649:1653): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:19.280387 kernel: audit: type=1400 audit(1712958498.653:1654): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:18.653000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:19.372022 kernel: audit: type=1300 audit(1712958498.653:1654): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328380 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:18.653000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001328380 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:19.493371 kernel: audit: type=1327 audit(1712958498.653:1654): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:18.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:19.586872 kernel: audit: type=1400 audit(1712958498.653:1655): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:18.653000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:18.653000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d25400 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:48:18.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:19.292000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:48:19.292000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001086200 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:48:19.292000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:48:19.395000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:48:19.395000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b60500 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:48:19.395000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:49:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.800129 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:49:01.800182 kernel: audit: type=1400 audit(1712958541.771:1658): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01261a1e0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.988257 kernel: audit: type=1300 audit(1712958541.771:1658): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01261a1e0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.988325 kernel: audit: type=1327 audit(1712958541.771:1658): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:02.080709 kernel: audit: type=1400 audit(1712958541.771:1659): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:02.170720 kernel: audit: type=1300 audit(1712958541.771:1659): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c012ea9140 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c012ea9140 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:02.269159 kernel: audit: type=1327 audit(1712958541.771:1659): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:02.362322 kernel: audit: type=1400 audit(1712958541.771:1660): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:02.452317 kernel: audit: type=1300 audit(1712958541.771:1660): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c002791ea0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c002791ea0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:02.550724 kernel: audit: type=1327 audit(1712958541.771:1660): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:02.643915 kernel: audit: type=1400 audit(1712958541.780:1661): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.780000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.780000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c01261a240 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:01.780000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.780000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0025a43e0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:01.784000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:01.784000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c002899ad0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:49:01.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:49:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020c7860 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026438a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:18.674210 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:49:18.674262 kernel: audit: type=1400 audit(1712958558.646:1666): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024048c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:18.883952 kernel: audit: type=1300 audit(1712958558.646:1666): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024048c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:18.883986 kernel: audit: type=1327 audit(1712958558.646:1666): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:18.649000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:19.065577 kernel: audit: type=1400 audit(1712958558.649:1667): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:19.065609 kernel: audit: type=1300 audit(1712958558.649:1667): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264f920 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:18.649000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00264f920 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:19.185570 kernel: audit: type=1327 audit(1712958558.649:1667): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:18.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:19.278910 kernel: audit: type=1400 audit(1712958558.653:1668): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:18.653000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:19.369112 kernel: audit: type=1300 audit(1712958558.653:1668): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00229b640 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:18.653000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00229b640 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:19.489722 kernel: audit: type=1327 audit(1712958558.653:1668): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:18.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:19.583073 kernel: audit: type=1400 audit(1712958558.653:1669): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:18.653000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:18.653000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024048e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:49:18.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:19.292000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:49:19.292000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c22160 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:49:19.292000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:49:19.394000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:49:19.394000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b61280 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:49:19.394000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.800793 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:50:01.800903 kernel: audit: type=1400 audit(1712958601.771:1672): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012d9aea0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.989096 kernel: audit: type=1300 audit(1712958601.771:1672): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012d9aea0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.989132 kernel: audit: type=1327 audit(1712958601.771:1672): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:02.081477 kernel: audit: type=1400 audit(1712958601.771:1673): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:02.170855 kernel: audit: type=1300 audit(1712958601.771:1673): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0066a7700 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0066a7700 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:02.269290 kernel: audit: type=1327 audit(1712958601.771:1673): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:02.362468 kernel: audit: type=1400 audit(1712958601.771:1674): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.771000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:02.453056 kernel: audit: type=1300 audit(1712958601.771:1674): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006e30930 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.771000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006e30930 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:02.551433 kernel: audit: type=1327 audit(1712958601.771:1674): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:01.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:02.644601 kernel: audit: type=1400 audit(1712958601.780:1675): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.780000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.780000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006e30a20 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c008040e80 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:01.784000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:01.784000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a684360 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:50:01.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:50:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001572db0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:02.028000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:02.028000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027b0460 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:02.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:18.646000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:18.675207 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:50:18.675278 kernel: audit: type=1400 audit(1712958618.646:1680): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:18.646000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002212420 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:18.886496 kernel: audit: type=1300 audit(1712958618.646:1680): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002212420 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:18.886527 kernel: audit: type=1327 audit(1712958618.646:1680): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:18.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:18.979877 kernel: audit: type=1400 audit(1712958618.650:1681): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:18.650000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:19.070928 kernel: audit: type=1300 audit(1712958618.650:1681): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002212440 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:18.650000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002212440 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:19.191309 kernel: audit: type=1327 audit(1712958618.650:1681): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:18.650000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:19.284674 kernel: audit: type=1400 audit(1712958618.653:1682): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:18.653000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:19.374703 kernel: audit: type=1300 audit(1712958618.653:1682): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277b0e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:18.653000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277b0e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:19.495191 kernel: audit: type=1327 audit(1712958618.653:1682): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:18.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:19.588399 kernel: audit: type=1400 audit(1712958618.653:1683): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:18.653000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:18.653000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00277b100 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:50:18.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:19.293000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:50:19.293000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c22200 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:50:19.293000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:19.395000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:50:19.395000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00109b240 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:50:19.395000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:56.515495 systemd[1]: Started sshd@9-139.178.89.153:22-218.149.167.118:60626.service. Apr 12 21:50:56.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.153:22-218.149.167.118:60626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.547495 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:50:56.547600 kernel: audit: type=1130 audit(1712958656.514:1686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.153:22-218.149.167.118:60626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.731188 systemd[1]: Started sshd@10-139.178.89.153:22-147.75.109.163:55470.service. Apr 12 21:50:56.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.153:22-147.75.109.163:55470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.822423 kernel: audit: type=1130 audit(1712958656.730:1687): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.153:22-147.75.109.163:55470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.846000 audit[10363]: USER_ACCT pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.847364 sshd[10363]: Accepted publickey for core from 147.75.109.163 port 55470 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:50:56.848497 sshd[10363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:50:56.851298 systemd-logind[1459]: New session 10 of user core. Apr 12 21:50:56.853021 systemd[1]: Started session-10.scope. Apr 12 21:50:56.937823 sshd[10363]: pam_unix(sshd:session): session closed for user core Apr 12 21:50:56.939209 systemd[1]: sshd@10-139.178.89.153:22-147.75.109.163:55470.service: Deactivated successfully. Apr 12 21:50:56.847000 audit[10363]: CRED_ACQ pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.939667 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 21:50:56.940057 systemd-logind[1459]: Session 10 logged out. Waiting for processes to exit. Apr 12 21:50:56.940647 systemd-logind[1459]: Removed session 10. Apr 12 21:50:57.029938 kernel: audit: type=1101 audit(1712958656.846:1688): pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:57.029987 kernel: audit: type=1103 audit(1712958656.847:1689): pid=10363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:57.030007 kernel: audit: type=1006 audit(1712958656.847:1690): pid=10363 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 21:50:57.089236 kernel: audit: type=1300 audit(1712958656.847:1690): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebf2889d0 a2=3 a3=0 items=0 ppid=1 pid=10363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:50:56.847000 audit[10363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebf2889d0 a2=3 a3=0 items=0 ppid=1 pid=10363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:50:57.182314 kernel: audit: type=1327 audit(1712958656.847:1690): proctitle=737368643A20636F7265205B707269765D Apr 12 21:50:56.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:50:57.213110 kernel: audit: type=1105 audit(1712958656.854:1691): pid=10363 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.854000 audit[10363]: USER_START pid=10363 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:57.308599 kernel: audit: type=1103 audit(1712958656.854:1692): pid=10366 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.854000 audit[10366]: CRED_ACQ pid=10366 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:57.398265 kernel: audit: type=1106 audit(1712958656.937:1693): pid=10363 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.937000 audit[10363]: USER_END pid=10363 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.937000 audit[10363]: CRED_DISP pid=10363 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:50:56.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.153:22-147.75.109.163:55470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:58.043917 sshd[10361]: Invalid user admin from 218.149.167.118 port 60626 Apr 12 21:50:58.050178 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:50:58.051196 sshd[10361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:50:58.051308 sshd[10361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.167.118 Apr 12 21:50:58.052195 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:50:58.051000 audit[10361]: USER_AUTH pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:50:59.091435 sshd[10361]: Failed password for invalid user admin from 218.149.167.118 port 60626 ssh2 Apr 12 21:50:59.484582 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:50:59.485387 sshd[10361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:50:59.486146 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:50:59.485000 audit[10361]: USER_AUTH pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:51:01.328585 sshd[10361]: Failed password for invalid user admin from 218.149.167.118 port 60626 ssh2 Apr 12 21:51:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.800800 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 21:51:01.800841 kernel: audit: type=1400 audit(1712958661.772:1698): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c001270600 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.991714 kernel: audit: type=1300 audit(1712958661.772:1698): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c001270600 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.991758 kernel: audit: type=1327 audit(1712958661.772:1698): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:02.062058 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:02.062276 sshd[10361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:51:02.062453 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:02.086969 systemd[1]: Started sshd@11-139.178.89.153:22-147.75.109.163:41196.service. Apr 12 21:51:02.174815 kernel: audit: type=1400 audit(1712958661.772:1699): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524825 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:02.174859 kernel: audit: type=1300 audit(1712958661.772:1699): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009cf49c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009cf49c0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:02.272732 kernel: audit: type=1327 audit(1712958661.772:1699): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:02.365536 kernel: audit: type=1400 audit(1712958661.772:1700): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.772000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:02.456010 kernel: audit: type=1300 audit(1712958661.772:1700): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0113b9240 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.772000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0113b9240 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:02.480021 sshd[10396]: Accepted publickey for core from 147.75.109.163 port 41196 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:02.481569 sshd[10396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:02.484104 systemd-logind[1459]: New session 11 of user core. Apr 12 21:51:02.484672 systemd[1]: Started session-11.scope. Apr 12 21:51:01.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:02.562553 sshd[10396]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:02.563951 systemd[1]: sshd@11-139.178.89.153:22-147.75.109.163:41196.service: Deactivated successfully. Apr 12 21:51:02.564404 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 21:51:02.564807 systemd-logind[1459]: Session 11 logged out. Waiting for processes to exit. Apr 12 21:51:02.565228 systemd-logind[1459]: Removed session 11. Apr 12 21:51:02.648240 kernel: audit: type=1327 audit(1712958661.772:1700): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:02.648279 kernel: audit: type=1400 audit(1712958661.781:1701): avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.781000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524831 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c007912f60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:01.781000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c001271e60 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:01.784000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:01.784000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009cf4ae0 a2=fc6 a3=0 items=0 ppid=2259 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c432,c621 key=(null) Apr 12 21:51:01.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:51:02.029000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:02.029000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000087f40 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:02.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:02.029000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:02.029000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cfac60 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:02.029000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:02.061000 audit[10361]: USER_AUTH pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:51:02.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.153:22-147.75.109.163:41196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:02.478000 audit[10396]: USER_ACCT pid=10396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:02.480000 audit[10396]: CRED_ACQ pid=10396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:02.480000 audit[10396]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce49e0c00 a2=3 a3=0 items=0 ppid=1 pid=10396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:02.480000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:02.485000 audit[10396]: USER_START pid=10396 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:02.485000 audit[10399]: CRED_ACQ pid=10399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:02.561000 audit[10396]: USER_END pid=10396 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:02.561000 audit[10396]: CRED_DISP pid=10396 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:02.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.153:22-147.75.109.163:41196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:04.316508 sshd[10361]: Failed password for invalid user admin from 218.149.167.118 port 60626 ssh2 Apr 12 21:51:04.642294 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:04.643549 sshd[10361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:51:04.644636 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:04.643000 audit[10361]: USER_AUTH pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:51:06.507433 sshd[10361]: Failed password for invalid user admin from 218.149.167.118 port 60626 ssh2 Apr 12 21:51:07.361613 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:07.362869 sshd[10361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:51:07.363977 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:07.362000 audit[10361]: USER_AUTH pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:51:07.391492 kernel: kauditd_printk_skb: 27 callbacks suppressed Apr 12 21:51:07.391581 kernel: audit: type=1100 audit(1712958667.362:1717): pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:51:07.567633 systemd[1]: Started sshd@12-139.178.89.153:22-147.75.109.163:54914.service. Apr 12 21:51:07.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.153:22-147.75.109.163:54914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:07.658280 kernel: audit: type=1130 audit(1712958667.566:1718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.153:22-147.75.109.163:54914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:07.682000 audit[10431]: USER_ACCT pid=10431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.683450 sshd[10431]: Accepted publickey for core from 147.75.109.163 port 54914 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:07.686578 sshd[10431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:07.688942 systemd-logind[1459]: New session 12 of user core. Apr 12 21:51:07.689448 systemd[1]: Started session-12.scope. Apr 12 21:51:07.771001 sshd[10431]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:07.772408 systemd[1]: sshd@12-139.178.89.153:22-147.75.109.163:54914.service: Deactivated successfully. Apr 12 21:51:07.772855 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 21:51:07.773430 systemd-logind[1459]: Session 12 logged out. Waiting for processes to exit. Apr 12 21:51:07.774042 systemd-logind[1459]: Removed session 12. Apr 12 21:51:07.685000 audit[10431]: CRED_ACQ pid=10431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.867890 kernel: audit: type=1101 audit(1712958667.682:1719): pid=10431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.867965 kernel: audit: type=1103 audit(1712958667.685:1720): pid=10431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.867981 kernel: audit: type=1006 audit(1712958667.685:1721): pid=10431 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 21:51:07.926950 kernel: audit: type=1300 audit(1712958667.685:1721): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcddbf02a0 a2=3 a3=0 items=0 ppid=1 pid=10431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:07.685000 audit[10431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcddbf02a0 a2=3 a3=0 items=0 ppid=1 pid=10431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:08.019817 kernel: audit: type=1327 audit(1712958667.685:1721): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:07.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:08.050660 kernel: audit: type=1105 audit(1712958667.690:1722): pid=10431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.690000 audit[10431]: USER_START pid=10431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:08.146267 kernel: audit: type=1103 audit(1712958667.691:1723): pid=10433 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.691000 audit[10433]: CRED_ACQ pid=10433 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:08.235758 kernel: audit: type=1106 audit(1712958667.770:1724): pid=10431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.770000 audit[10431]: USER_END pid=10431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.770000 audit[10431]: CRED_DISP pid=10431 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:07.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.153:22-147.75.109.163:54914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:09.637490 sshd[10361]: Failed password for invalid user admin from 218.149.167.118 port 60626 ssh2 Apr 12 21:51:12.216840 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:12.218009 sshd[10361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:51:12.219063 sshd[10361]: pam_faillock(sshd:auth): User unknown Apr 12 21:51:12.217000 audit[10361]: USER_AUTH pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=218.149.167.118 addr=218.149.167.118 terminal=ssh res=failed' Apr 12 21:51:12.783816 systemd[1]: Started sshd@13-139.178.89.153:22-147.75.109.163:54924.service. Apr 12 21:51:12.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.153:22-147.75.109.163:54924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:12.810712 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 21:51:12.810761 kernel: audit: type=1130 audit(1712958672.782:1728): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.153:22-147.75.109.163:54924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:12.927000 audit[10502]: USER_ACCT pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:12.929030 sshd[10502]: Accepted publickey for core from 147.75.109.163 port 54924 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:12.930542 sshd[10502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:12.933069 systemd-logind[1459]: New session 13 of user core. Apr 12 21:51:12.933551 systemd[1]: Started session-13.scope. Apr 12 21:51:13.013620 sshd[10502]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:13.015535 systemd[1]: sshd@13-139.178.89.153:22-147.75.109.163:54924.service: Deactivated successfully. Apr 12 21:51:13.015892 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 21:51:13.016426 systemd-logind[1459]: Session 13 logged out. Waiting for processes to exit. Apr 12 21:51:13.016992 systemd[1]: Started sshd@14-139.178.89.153:22-147.75.109.163:54930.service. Apr 12 21:51:13.017677 systemd-logind[1459]: Removed session 13. Apr 12 21:51:12.929000 audit[10502]: CRED_ACQ pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.112173 kernel: audit: type=1101 audit(1712958672.927:1729): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.112214 kernel: audit: type=1103 audit(1712958672.929:1730): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.112232 kernel: audit: type=1006 audit(1712958672.929:1731): pid=10502 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 21:51:13.171030 kernel: audit: type=1300 audit(1712958672.929:1731): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe339614d0 a2=3 a3=0 items=0 ppid=1 pid=10502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:12.929000 audit[10502]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe339614d0 a2=3 a3=0 items=0 ppid=1 pid=10502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:13.199303 sshd[10527]: Accepted publickey for core from 147.75.109.163 port 54930 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:13.200381 sshd[10527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:13.202976 systemd-logind[1459]: New session 14 of user core. Apr 12 21:51:13.203427 systemd[1]: Started session-14.scope. Apr 12 21:51:13.263455 kernel: audit: type=1327 audit(1712958672.929:1731): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:12.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:13.294223 kernel: audit: type=1105 audit(1712958672.935:1732): pid=10502 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:12.935000 audit[10502]: USER_START pid=10502 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.389305 kernel: audit: type=1103 audit(1712958672.935:1733): pid=10504 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:12.935000 audit[10504]: CRED_ACQ pid=10504 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.013000 audit[10502]: USER_END pid=10502 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.575109 kernel: audit: type=1106 audit(1712958673.013:1734): pid=10502 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.575200 kernel: audit: type=1104 audit(1712958673.013:1735): pid=10502 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.013000 audit[10502]: CRED_DISP pid=10502 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.89.153:22-147.75.109.163:54924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:13.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.153:22-147.75.109.163:54930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:13.197000 audit[10527]: USER_ACCT pid=10527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.198000 audit[10527]: CRED_ACQ pid=10527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.198000 audit[10527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5791d730 a2=3 a3=0 items=0 ppid=1 pid=10527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:13.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:13.206000 audit[10527]: USER_START pid=10527 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.206000 audit[10529]: CRED_ACQ pid=10529 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.721743 sshd[10527]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:13.722000 audit[10527]: USER_END pid=10527 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.723000 audit[10527]: CRED_DISP pid=10527 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.729418 systemd[1]: sshd@14-139.178.89.153:22-147.75.109.163:54930.service: Deactivated successfully. Apr 12 21:51:13.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.89.153:22-147.75.109.163:54930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:13.731110 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 21:51:13.733523 systemd-logind[1459]: Session 14 logged out. Waiting for processes to exit. Apr 12 21:51:13.736850 systemd[1]: Started sshd@15-139.178.89.153:22-147.75.109.163:54940.service. Apr 12 21:51:13.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.153:22-147.75.109.163:54940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:13.740328 systemd-logind[1459]: Removed session 14. Apr 12 21:51:13.792000 audit[10551]: USER_ACCT pid=10551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.794069 sshd[10551]: Accepted publickey for core from 147.75.109.163 port 54940 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:13.794000 audit[10551]: CRED_ACQ pid=10551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.795000 audit[10551]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3762fd00 a2=3 a3=0 items=0 ppid=1 pid=10551 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:13.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:13.797453 sshd[10551]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:13.807364 systemd-logind[1459]: New session 15 of user core. Apr 12 21:51:13.809740 systemd[1]: Started session-15.scope. Apr 12 21:51:13.823000 audit[10551]: USER_START pid=10551 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.826000 audit[10554]: CRED_ACQ pid=10554 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.951837 sshd[10551]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:13.951000 audit[10551]: USER_END pid=10551 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.951000 audit[10551]: CRED_DISP pid=10551 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:13.953070 systemd[1]: sshd@15-139.178.89.153:22-147.75.109.163:54940.service: Deactivated successfully. Apr 12 21:51:13.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.89.153:22-147.75.109.163:54940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:13.953518 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 21:51:13.953846 systemd-logind[1459]: Session 15 logged out. Waiting for processes to exit. Apr 12 21:51:13.954181 systemd-logind[1459]: Removed session 15. Apr 12 21:51:14.512613 sshd[10361]: Failed password for invalid user admin from 218.149.167.118 port 60626 ssh2 Apr 12 21:51:16.766572 sshd[10361]: maximum authentication attempts exceeded for invalid user admin from 218.149.167.118 port 60626 ssh2 [preauth] Apr 12 21:51:16.766572 sshd[10361]: Disconnecting invalid user admin 218.149.167.118 port 60626: Too many authentication failures [preauth] Apr 12 21:51:16.767311 sshd[10361]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.167.118 Apr 12 21:51:16.767328 sshd[10361]: PAM service(sshd) ignoring max retries; 6 > 3 Apr 12 21:51:16.769823 systemd[1]: sshd@9-139.178.89.153:22-218.149.167.118:60626.service: Deactivated successfully. Apr 12 21:51:16.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.153:22-218.149.167.118:60626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:18.647000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:18.692015 kernel: kauditd_printk_skb: 24 callbacks suppressed Apr 12 21:51:18.692119 kernel: audit: type=1400 audit(1712958678.647:1756): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:18.647000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001496fe0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:18.901409 kernel: audit: type=1300 audit(1712958678.647:1756): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001496fe0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:18.901446 kernel: audit: type=1327 audit(1712958678.647:1756): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:18.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:18.955267 systemd[1]: Started sshd@16-139.178.89.153:22-147.75.109.163:50718.service. Apr 12 21:51:18.651000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:19.083980 kernel: audit: type=1400 audit(1712958678.651:1757): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:19.084018 kernel: audit: type=1300 audit(1712958678.651:1757): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00297bda0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:18.651000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00297bda0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:19.108974 sshd[10662]: Accepted publickey for core from 147.75.109.163 port 50718 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:19.110383 sshd[10662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:19.112582 systemd-logind[1459]: New session 16 of user core. Apr 12 21:51:19.113080 systemd[1]: Started session-16.scope. Apr 12 21:51:19.194602 sshd[10662]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:19.196036 systemd[1]: sshd@16-139.178.89.153:22-147.75.109.163:50718.service: Deactivated successfully. Apr 12 21:51:19.196480 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 21:51:19.196863 systemd-logind[1459]: Session 16 logged out. Waiting for processes to exit. Apr 12 21:51:19.197318 systemd-logind[1459]: Removed session 16. Apr 12 21:51:19.203941 kernel: audit: type=1327 audit(1712958678.651:1757): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:18.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:19.297164 kernel: audit: type=1400 audit(1712958678.654:1758): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:18.654000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:19.387240 kernel: audit: type=1400 audit(1712958678.654:1759): avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:18.654000 audit[2418]: AVC avc: denied { watch } for pid=2418 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524814 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:18.654000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea3400 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:19.597511 kernel: audit: type=1300 audit(1712958678.654:1758): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea3400 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:19.597549 kernel: audit: type=1327 audit(1712958678.654:1758): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:18.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:18.654000 audit[2418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00297bdc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c734 key=(null) Apr 12 21:51:18.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:18.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.153:22-147.75.109.163:50718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:19.107000 audit[10662]: USER_ACCT pid=10662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:19.108000 audit[10662]: CRED_ACQ pid=10662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:19.108000 audit[10662]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf5054b0 a2=3 a3=0 items=0 ppid=1 pid=10662 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:19.108000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:19.113000 audit[10662]: USER_START pid=10662 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:19.114000 audit[10664]: CRED_ACQ pid=10664 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:19.193000 audit[10662]: USER_END pid=10662 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:19.194000 audit[10662]: CRED_DISP pid=10662 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:19.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.89.153:22-147.75.109.163:50718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:19.294000 audit[5625]: AVC avc: denied { watch } for pid=5625 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2589211148/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c334,c657 tclass=file permissive=0 Apr 12 21:51:19.294000 audit[5625]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00032ffe0 a2=fc6 a3=0 items=0 ppid=5523 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c334,c657 key=(null) Apr 12 21:51:19.294000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:51:19.396000 audit[5682]: AVC avc: denied { watch } for pid=5682 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_31_15.2534956374/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c423,c429 tclass=file permissive=0 Apr 12 21:51:19.396000 audit[5682]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b2c5e0 a2=fc6 a3=0 items=0 ppid=5568 pid=5682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c423,c429 key=(null) Apr 12 21:51:19.396000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:51:24.198414 systemd[1]: Started sshd@17-139.178.89.153:22-147.75.109.163:50734.service. Apr 12 21:51:24.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.153:22-147.75.109.163:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:24.225782 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 21:51:24.225836 kernel: audit: type=1130 audit(1712958684.197:1771): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.153:22-147.75.109.163:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:24.340000 audit[10688]: USER_ACCT pid=10688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.342659 sshd[10688]: Accepted publickey for core from 147.75.109.163 port 50734 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:24.346621 sshd[10688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:24.357553 systemd-logind[1459]: New session 17 of user core. Apr 12 21:51:24.360331 systemd[1]: Started session-17.scope. Apr 12 21:51:24.344000 audit[10688]: CRED_ACQ pid=10688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.448711 sshd[10688]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:24.450195 systemd[1]: sshd@17-139.178.89.153:22-147.75.109.163:50734.service: Deactivated successfully. Apr 12 21:51:24.450641 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 21:51:24.450993 systemd-logind[1459]: Session 17 logged out. Waiting for processes to exit. Apr 12 21:51:24.451492 systemd-logind[1459]: Removed session 17. Apr 12 21:51:24.526626 kernel: audit: type=1101 audit(1712958684.340:1772): pid=10688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.526697 kernel: audit: type=1103 audit(1712958684.344:1773): pid=10688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.526736 kernel: audit: type=1006 audit(1712958684.344:1774): pid=10688 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 21:51:24.344000 audit[10688]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc604b4260 a2=3 a3=0 items=0 ppid=1 pid=10688 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:24.678426 kernel: audit: type=1300 audit(1712958684.344:1774): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc604b4260 a2=3 a3=0 items=0 ppid=1 pid=10688 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:24.678485 kernel: audit: type=1327 audit(1712958684.344:1774): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:24.344000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:24.369000 audit[10688]: USER_START pid=10688 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.805143 kernel: audit: type=1105 audit(1712958684.369:1775): pid=10688 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.805184 kernel: audit: type=1103 audit(1712958684.371:1776): pid=10695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.371000 audit[10695]: CRED_ACQ pid=10695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.448000 audit[10688]: USER_END pid=10688 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.990828 kernel: audit: type=1106 audit(1712958684.448:1777): pid=10688 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.990891 kernel: audit: type=1104 audit(1712958684.448:1778): pid=10688 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.448000 audit[10688]: CRED_DISP pid=10688 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:24.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.89.153:22-147.75.109.163:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:29.454544 systemd[1]: Started sshd@18-139.178.89.153:22-147.75.109.163:49922.service. Apr 12 21:51:29.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.153:22-147.75.109.163:49922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:29.481380 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:51:29.481490 kernel: audit: type=1130 audit(1712958689.453:1780): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.153:22-147.75.109.163:49922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:29.594000 audit[10718]: USER_ACCT pid=10718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.595949 sshd[10718]: Accepted publickey for core from 147.75.109.163 port 49922 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:29.599754 sshd[10718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:29.610723 systemd-logind[1459]: New session 18 of user core. Apr 12 21:51:29.613516 systemd[1]: Started session-18.scope. Apr 12 21:51:29.597000 audit[10718]: CRED_ACQ pid=10718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.700738 sshd[10718]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:29.702179 systemd[1]: sshd@18-139.178.89.153:22-147.75.109.163:49922.service: Deactivated successfully. Apr 12 21:51:29.702621 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 21:51:29.702978 systemd-logind[1459]: Session 18 logged out. Waiting for processes to exit. Apr 12 21:51:29.703566 systemd-logind[1459]: Removed session 18. Apr 12 21:51:29.778321 kernel: audit: type=1101 audit(1712958689.594:1781): pid=10718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.778400 kernel: audit: type=1103 audit(1712958689.597:1782): pid=10718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.778445 kernel: audit: type=1006 audit(1712958689.597:1783): pid=10718 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 21:51:29.597000 audit[10718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd97cd2960 a2=3 a3=0 items=0 ppid=1 pid=10718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:29.929001 kernel: audit: type=1300 audit(1712958689.597:1783): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd97cd2960 a2=3 a3=0 items=0 ppid=1 pid=10718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:29.929069 kernel: audit: type=1327 audit(1712958689.597:1783): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:29.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:29.620000 audit[10718]: USER_START pid=10718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:30.054111 kernel: audit: type=1105 audit(1712958689.620:1784): pid=10718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:30.054162 kernel: audit: type=1103 audit(1712958689.622:1785): pid=10720 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.622000 audit[10720]: CRED_ACQ pid=10720 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.700000 audit[10718]: USER_END pid=10718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:30.238946 kernel: audit: type=1106 audit(1712958689.700:1786): pid=10718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:30.239009 kernel: audit: type=1104 audit(1712958689.700:1787): pid=10718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.700000 audit[10718]: CRED_DISP pid=10718 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:29.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.89.153:22-147.75.109.163:49922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:34.710213 systemd[1]: Started sshd@19-139.178.89.153:22-147.75.109.163:49938.service. Apr 12 21:51:34.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.153:22-147.75.109.163:49938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:34.737207 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:51:34.737366 kernel: audit: type=1130 audit(1712958694.709:1789): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.153:22-147.75.109.163:49938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:34.852745 sshd[10748]: Accepted publickey for core from 147.75.109.163 port 49938 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:34.851000 audit[10748]: USER_ACCT pid=10748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:34.853539 sshd[10748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:34.855973 systemd-logind[1459]: New session 19 of user core. Apr 12 21:51:34.856425 systemd[1]: Started session-19.scope. Apr 12 21:51:34.936181 sshd[10748]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:34.938102 systemd[1]: sshd@19-139.178.89.153:22-147.75.109.163:49938.service: Deactivated successfully. Apr 12 21:51:34.938467 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 21:51:34.938960 systemd-logind[1459]: Session 19 logged out. Waiting for processes to exit. Apr 12 21:51:34.939509 systemd[1]: Started sshd@20-139.178.89.153:22-147.75.109.163:49944.service. Apr 12 21:51:34.940163 systemd-logind[1459]: Removed session 19. Apr 12 21:51:34.852000 audit[10748]: CRED_ACQ pid=10748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.034917 kernel: audit: type=1101 audit(1712958694.851:1790): pid=10748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.034954 kernel: audit: type=1103 audit(1712958694.852:1791): pid=10748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.034976 kernel: audit: type=1006 audit(1712958694.852:1792): pid=10748 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 21:51:35.093552 kernel: audit: type=1300 audit(1712958694.852:1792): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0fcc740 a2=3 a3=0 items=0 ppid=1 pid=10748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:34.852000 audit[10748]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0fcc740 a2=3 a3=0 items=0 ppid=1 pid=10748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:35.118067 sshd[10773]: Accepted publickey for core from 147.75.109.163 port 49944 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:35.121572 sshd[10773]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:35.124249 systemd-logind[1459]: New session 20 of user core. Apr 12 21:51:35.124737 systemd[1]: Started session-20.scope. Apr 12 21:51:35.185670 kernel: audit: type=1327 audit(1712958694.852:1792): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:34.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:35.216192 kernel: audit: type=1105 audit(1712958694.857:1793): pid=10748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:34.857000 audit[10748]: USER_START pid=10748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.243230 sshd[10773]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:35.245168 systemd[1]: sshd@20-139.178.89.153:22-147.75.109.163:49944.service: Deactivated successfully. Apr 12 21:51:35.245536 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 21:51:35.245913 systemd-logind[1459]: Session 20 logged out. Waiting for processes to exit. Apr 12 21:51:35.246505 systemd[1]: Started sshd@21-139.178.89.153:22-147.75.109.163:49956.service. Apr 12 21:51:35.246880 systemd-logind[1459]: Removed session 20. Apr 12 21:51:35.310792 kernel: audit: type=1103 audit(1712958694.857:1794): pid=10750 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:34.857000 audit[10750]: CRED_ACQ pid=10750 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.400084 kernel: audit: type=1106 audit(1712958694.935:1795): pid=10748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:34.935000 audit[10748]: USER_END pid=10748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.424784 sshd[10795]: Accepted publickey for core from 147.75.109.163 port 49956 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:35.426343 sshd[10795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:35.428672 systemd-logind[1459]: New session 21 of user core. Apr 12 21:51:35.429157 systemd[1]: Started session-21.scope. Apr 12 21:51:35.495785 kernel: audit: type=1104 audit(1712958694.935:1796): pid=10748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:34.935000 audit[10748]: CRED_DISP pid=10748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:34.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.89.153:22-147.75.109.163:49938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:34.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.89.153:22-147.75.109.163:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:35.116000 audit[10773]: USER_ACCT pid=10773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.120000 audit[10773]: CRED_ACQ pid=10773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.120000 audit[10773]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad217320 a2=3 a3=0 items=0 ppid=1 pid=10773 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:35.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:35.127000 audit[10773]: USER_START pid=10773 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.128000 audit[10775]: CRED_ACQ pid=10775 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.242000 audit[10773]: USER_END pid=10773 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.242000 audit[10773]: CRED_DISP pid=10773 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.89.153:22-147.75.109.163:49944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:35.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.89.153:22-147.75.109.163:49956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:35.423000 audit[10795]: USER_ACCT pid=10795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.424000 audit[10795]: CRED_ACQ pid=10795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.424000 audit[10795]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb334e7f0 a2=3 a3=0 items=0 ppid=1 pid=10795 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:35.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:35.430000 audit[10795]: USER_START pid=10795 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:35.430000 audit[10797]: CRED_ACQ pid=10797 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.181000 audit[10823]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=10823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:36.181000 audit[10823]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc0e4da5e0 a2=0 a3=7ffc0e4da5cc items=0 ppid=2812 pid=10823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:36.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:36.191000 audit[10823]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=10823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:36.191000 audit[10823]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc0e4da5e0 a2=0 a3=0 items=0 ppid=2812 pid=10823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:36.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:36.205005 sshd[10795]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:36.206000 audit[10795]: USER_END pid=10795 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.207000 audit[10795]: CRED_DISP pid=10795 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.214124 systemd[1]: sshd@21-139.178.89.153:22-147.75.109.163:49956.service: Deactivated successfully. Apr 12 21:51:36.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.89.153:22-147.75.109.163:49956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:36.217043 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 21:51:36.219090 systemd-logind[1459]: Session 21 logged out. Waiting for processes to exit. Apr 12 21:51:36.222547 systemd[1]: Started sshd@22-139.178.89.153:22-147.75.109.163:49964.service. Apr 12 21:51:36.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.89.153:22-147.75.109.163:49964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:36.224855 systemd-logind[1459]: Removed session 21. Apr 12 21:51:36.233000 audit[10829]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=10829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:36.233000 audit[10829]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffffb505f60 a2=0 a3=7ffffb505f4c items=0 ppid=2812 pid=10829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:36.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:36.234000 audit[10829]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=10829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:36.234000 audit[10829]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffffb505f60 a2=0 a3=0 items=0 ppid=2812 pid=10829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:36.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:36.272000 audit[10828]: USER_ACCT pid=10828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.274046 sshd[10828]: Accepted publickey for core from 147.75.109.163 port 49964 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:36.275000 audit[10828]: CRED_ACQ pid=10828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.275000 audit[10828]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbc44d2b0 a2=3 a3=0 items=0 ppid=1 pid=10828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:36.275000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:36.277510 sshd[10828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:36.288119 systemd-logind[1459]: New session 22 of user core. Apr 12 21:51:36.291182 systemd[1]: Started session-22.scope. Apr 12 21:51:36.306000 audit[10828]: USER_START pid=10828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.309000 audit[10832]: CRED_ACQ pid=10832 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.552749 sshd[10828]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:36.552000 audit[10828]: USER_END pid=10828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.552000 audit[10828]: CRED_DISP pid=10828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.554575 systemd[1]: sshd@22-139.178.89.153:22-147.75.109.163:49964.service: Deactivated successfully. Apr 12 21:51:36.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.89.153:22-147.75.109.163:49964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:36.554968 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 21:51:36.555277 systemd-logind[1459]: Session 22 logged out. Waiting for processes to exit. Apr 12 21:51:36.555958 systemd[1]: Started sshd@23-139.178.89.153:22-147.75.109.163:49980.service. Apr 12 21:51:36.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.89.153:22-147.75.109.163:49980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:36.556351 systemd-logind[1459]: Removed session 22. Apr 12 21:51:36.586000 audit[10853]: USER_ACCT pid=10853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.587462 sshd[10853]: Accepted publickey for core from 147.75.109.163 port 49980 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:36.586000 audit[10853]: CRED_ACQ pid=10853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.586000 audit[10853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8330f720 a2=3 a3=0 items=0 ppid=1 pid=10853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:36.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:36.588267 sshd[10853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:36.590974 systemd-logind[1459]: New session 23 of user core. Apr 12 21:51:36.591535 systemd[1]: Started session-23.scope. Apr 12 21:51:36.592000 audit[10853]: USER_START pid=10853 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.593000 audit[10855]: CRED_ACQ pid=10855 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.725240 sshd[10853]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:36.724000 audit[10853]: USER_END pid=10853 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.724000 audit[10853]: CRED_DISP pid=10853 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:36.726749 systemd[1]: sshd@23-139.178.89.153:22-147.75.109.163:49980.service: Deactivated successfully. Apr 12 21:51:36.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.89.153:22-147.75.109.163:49980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:36.727207 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 21:51:36.727597 systemd-logind[1459]: Session 23 logged out. Waiting for processes to exit. Apr 12 21:51:36.728050 systemd-logind[1459]: Removed session 23. Apr 12 21:51:41.042000 audit[10899]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=10899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:41.070781 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 21:51:41.070821 kernel: audit: type=1325 audit(1712958701.042:1838): table=filter:129 family=2 entries=20 op=nft_register_rule pid=10899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:41.042000 audit[10899]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd65197920 a2=0 a3=7ffd6519790c items=0 ppid=2812 pid=10899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:41.227228 kernel: audit: type=1300 audit(1712958701.042:1838): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd65197920 a2=0 a3=7ffd6519790c items=0 ppid=2812 pid=10899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:41.227263 kernel: audit: type=1327 audit(1712958701.042:1838): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:41.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:41.293000 audit[10899]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=10899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:41.293000 audit[10899]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd65197920 a2=0 a3=7ffd6519790c items=0 ppid=2812 pid=10899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:41.451020 kernel: audit: type=1325 audit(1712958701.293:1839): table=nat:130 family=2 entries=106 op=nft_register_chain pid=10899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:51:41.451057 kernel: audit: type=1300 audit(1712958701.293:1839): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd65197920 a2=0 a3=7ffd6519790c items=0 ppid=2812 pid=10899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:41.451073 kernel: audit: type=1327 audit(1712958701.293:1839): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:41.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:51:41.735246 systemd[1]: Started sshd@24-139.178.89.153:22-147.75.109.163:54798.service. Apr 12 21:51:41.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.153:22-147.75.109.163:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:41.827243 kernel: audit: type=1130 audit(1712958701.734:1840): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.153:22-147.75.109.163:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:41.850000 audit[10902]: USER_ACCT pid=10902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:41.852423 sshd[10902]: Accepted publickey for core from 147.75.109.163 port 54798 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:41.853560 sshd[10902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:41.855873 systemd-logind[1459]: New session 24 of user core. Apr 12 21:51:41.856356 systemd[1]: Started session-24.scope. Apr 12 21:51:41.934742 sshd[10902]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:41.935991 systemd[1]: sshd@24-139.178.89.153:22-147.75.109.163:54798.service: Deactivated successfully. Apr 12 21:51:41.936449 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 21:51:41.936854 systemd-logind[1459]: Session 24 logged out. Waiting for processes to exit. Apr 12 21:51:41.937240 systemd-logind[1459]: Removed session 24. Apr 12 21:51:41.852000 audit[10902]: CRED_ACQ pid=10902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:42.036882 kernel: audit: type=1101 audit(1712958701.850:1841): pid=10902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:42.036921 kernel: audit: type=1103 audit(1712958701.852:1842): pid=10902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:42.036937 kernel: audit: type=1006 audit(1712958701.852:1843): pid=10902 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 21:51:41.852000 audit[10902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc897ebe40 a2=3 a3=0 items=0 ppid=1 pid=10902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:41.852000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:41.857000 audit[10902]: USER_START pid=10902 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:41.857000 audit[10904]: CRED_ACQ pid=10904 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:41.934000 audit[10902]: USER_END pid=10902 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:41.934000 audit[10902]: CRED_DISP pid=10902 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:41.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.89.153:22-147.75.109.163:54798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:46.944391 systemd[1]: Started sshd@25-139.178.89.153:22-147.75.109.163:54808.service. Apr 12 21:51:46.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.153:22-147.75.109.163:54808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:46.971702 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 21:51:46.971902 kernel: audit: type=1130 audit(1712958706.943:1849): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.153:22-147.75.109.163:54808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:47.086000 audit[10995]: USER_ACCT pid=10995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.087975 sshd[10995]: Accepted publickey for core from 147.75.109.163 port 54808 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:47.091917 sshd[10995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:47.103080 systemd-logind[1459]: New session 25 of user core. Apr 12 21:51:47.105578 systemd[1]: Started session-25.scope. Apr 12 21:51:47.089000 audit[10995]: CRED_ACQ pid=10995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.190599 sshd[10995]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:47.192016 systemd[1]: sshd@25-139.178.89.153:22-147.75.109.163:54808.service: Deactivated successfully. Apr 12 21:51:47.192471 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 21:51:47.192891 systemd-logind[1459]: Session 25 logged out. Waiting for processes to exit. Apr 12 21:51:47.193465 systemd-logind[1459]: Removed session 25. Apr 12 21:51:47.271322 kernel: audit: type=1101 audit(1712958707.086:1850): pid=10995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.271364 kernel: audit: type=1103 audit(1712958707.089:1851): pid=10995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.271383 kernel: audit: type=1006 audit(1712958707.089:1852): pid=10995 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 21:51:47.330649 kernel: audit: type=1300 audit(1712958707.089:1852): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94524080 a2=3 a3=0 items=0 ppid=1 pid=10995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:47.089000 audit[10995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd94524080 a2=3 a3=0 items=0 ppid=1 pid=10995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:47.423723 kernel: audit: type=1327 audit(1712958707.089:1852): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:47.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:47.454534 kernel: audit: type=1105 audit(1712958707.113:1853): pid=10995 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.113000 audit[10995]: USER_START pid=10995 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.550053 kernel: audit: type=1103 audit(1712958707.115:1854): pid=10997 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.115000 audit[10997]: CRED_ACQ pid=10997 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.639817 kernel: audit: type=1106 audit(1712958707.189:1855): pid=10995 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.189000 audit[10995]: USER_END pid=10995 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.190000 audit[10995]: CRED_DISP pid=10995 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.826731 kernel: audit: type=1104 audit(1712958707.190:1856): pid=10995 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:47.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.89.153:22-147.75.109.163:54808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:52.202723 systemd[1]: Started sshd@26-139.178.89.153:22-147.75.109.163:54350.service. Apr 12 21:51:52.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.153:22-147.75.109.163:54350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:52.230521 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:51:52.230600 kernel: audit: type=1130 audit(1712958712.201:1858): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.153:22-147.75.109.163:54350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:52.345000 audit[11022]: USER_ACCT pid=11022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.346734 sshd[11022]: Accepted publickey for core from 147.75.109.163 port 54350 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:52.347533 sshd[11022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:52.350003 systemd-logind[1459]: New session 26 of user core. Apr 12 21:51:52.350523 systemd[1]: Started session-26.scope. Apr 12 21:51:52.428740 sshd[11022]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:52.430308 systemd[1]: sshd@26-139.178.89.153:22-147.75.109.163:54350.service: Deactivated successfully. Apr 12 21:51:52.430766 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 21:51:52.431230 systemd-logind[1459]: Session 26 logged out. Waiting for processes to exit. Apr 12 21:51:52.431862 systemd-logind[1459]: Removed session 26. Apr 12 21:51:52.346000 audit[11022]: CRED_ACQ pid=11022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.529606 kernel: audit: type=1101 audit(1712958712.345:1859): pid=11022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.529643 kernel: audit: type=1103 audit(1712958712.346:1860): pid=11022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.529664 kernel: audit: type=1006 audit(1712958712.346:1861): pid=11022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 21:51:52.588311 kernel: audit: type=1300 audit(1712958712.346:1861): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8ec6bd0 a2=3 a3=0 items=0 ppid=1 pid=11022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:52.346000 audit[11022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8ec6bd0 a2=3 a3=0 items=0 ppid=1 pid=11022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:52.680425 kernel: audit: type=1327 audit(1712958712.346:1861): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:52.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:52.710927 kernel: audit: type=1105 audit(1712958712.352:1862): pid=11022 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.352000 audit[11022]: USER_START pid=11022 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.805560 kernel: audit: type=1103 audit(1712958712.353:1863): pid=11024 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.353000 audit[11024]: CRED_ACQ pid=11024 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.894898 kernel: audit: type=1106 audit(1712958712.428:1864): pid=11022 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.428000 audit[11022]: USER_END pid=11022 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.990550 kernel: audit: type=1104 audit(1712958712.428:1865): pid=11022 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.428000 audit[11022]: CRED_DISP pid=11022 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:52.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.89.153:22-147.75.109.163:54350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:57.432527 systemd[1]: Started sshd@27-139.178.89.153:22-147.75.109.163:42288.service. Apr 12 21:51:57.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.153:22-147.75.109.163:42288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:57.459675 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:51:57.459744 kernel: audit: type=1130 audit(1712958717.431:1867): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.153:22-147.75.109.163:42288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:57.573000 audit[11052]: USER_ACCT pid=11052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.574834 sshd[11052]: Accepted publickey for core from 147.75.109.163 port 42288 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:51:57.576196 sshd[11052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:51:57.578800 systemd-logind[1459]: New session 27 of user core. Apr 12 21:51:57.579291 systemd[1]: Started session-27.scope. Apr 12 21:51:57.658924 sshd[11052]: pam_unix(sshd:session): session closed for user core Apr 12 21:51:57.660589 systemd[1]: sshd@27-139.178.89.153:22-147.75.109.163:42288.service: Deactivated successfully. Apr 12 21:51:57.661059 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 21:51:57.661553 systemd-logind[1459]: Session 27 logged out. Waiting for processes to exit. Apr 12 21:51:57.662145 systemd-logind[1459]: Removed session 27. Apr 12 21:51:57.574000 audit[11052]: CRED_ACQ pid=11052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.757714 kernel: audit: type=1101 audit(1712958717.573:1868): pid=11052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.757762 kernel: audit: type=1103 audit(1712958717.574:1869): pid=11052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.757782 kernel: audit: type=1006 audit(1712958717.574:1870): pid=11052 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 21:51:57.816373 kernel: audit: type=1300 audit(1712958717.574:1870): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7950eba0 a2=3 a3=0 items=0 ppid=1 pid=11052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:57.574000 audit[11052]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7950eba0 a2=3 a3=0 items=0 ppid=1 pid=11052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:51:57.908566 kernel: audit: type=1327 audit(1712958717.574:1870): proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:57.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:51:57.939029 kernel: audit: type=1105 audit(1712958717.580:1871): pid=11052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.580000 audit[11052]: USER_START pid=11052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.581000 audit[11054]: CRED_ACQ pid=11054 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:58.122801 kernel: audit: type=1103 audit(1712958717.581:1872): pid=11054 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:58.122835 kernel: audit: type=1106 audit(1712958717.658:1873): pid=11052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.658000 audit[11052]: USER_END pid=11052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.658000 audit[11052]: CRED_DISP pid=11052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:58.307618 kernel: audit: type=1104 audit(1712958717.658:1874): pid=11052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:51:57.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.89.153:22-147.75.109.163:42288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'