Apr 12 21:45:13.546672 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 21:45:13.546685 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:45:13.546692 kernel: BIOS-provided physical RAM map: Apr 12 21:45:13.546696 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 21:45:13.546700 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 21:45:13.546703 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 21:45:13.546708 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 21:45:13.546712 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 21:45:13.546716 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000825d8fff] usable Apr 12 21:45:13.546720 kernel: BIOS-e820: [mem 0x00000000825d9000-0x00000000825d9fff] ACPI NVS Apr 12 21:45:13.546725 kernel: BIOS-e820: [mem 0x00000000825da000-0x00000000825dafff] reserved Apr 12 21:45:13.546730 kernel: BIOS-e820: [mem 0x00000000825db000-0x000000008afccfff] usable Apr 12 21:45:13.546735 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Apr 12 21:45:13.546739 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Apr 12 21:45:13.546745 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Apr 12 21:45:13.546751 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Apr 12 21:45:13.546755 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Apr 12 21:45:13.546759 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Apr 12 21:45:13.546763 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 21:45:13.546768 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 21:45:13.546772 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 21:45:13.546776 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 21:45:13.546780 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 21:45:13.546784 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Apr 12 21:45:13.546788 kernel: NX (Execute Disable) protection: active Apr 12 21:45:13.546792 kernel: SMBIOS 3.2.1 present. Apr 12 21:45:13.546797 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Apr 12 21:45:13.546802 kernel: tsc: Detected 3400.000 MHz processor Apr 12 21:45:13.546806 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 21:45:13.546810 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 21:45:13.546815 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 21:45:13.546819 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Apr 12 21:45:13.546824 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 21:45:13.546828 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Apr 12 21:45:13.546832 kernel: Using GB pages for direct mapping Apr 12 21:45:13.546837 kernel: ACPI: Early table checksum verification disabled Apr 12 21:45:13.546842 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 21:45:13.546846 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 21:45:13.546850 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Apr 12 21:45:13.546855 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 21:45:13.546861 kernel: ACPI: FACS 0x000000008C66CF80 000040 Apr 12 21:45:13.546866 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Apr 12 21:45:13.546871 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Apr 12 21:45:13.546876 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 21:45:13.546880 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 21:45:13.546885 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 21:45:13.546890 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 21:45:13.546894 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 21:45:13.546899 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 21:45:13.546904 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:45:13.546909 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 21:45:13.546914 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 21:45:13.546919 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:45:13.546923 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:45:13.546928 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 21:45:13.546932 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 21:45:13.546937 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:45:13.546942 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:45:13.546947 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 21:45:13.546952 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Apr 12 21:45:13.546956 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 21:45:13.546961 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 21:45:13.546966 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 21:45:13.546970 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Apr 12 21:45:13.546975 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 21:45:13.546980 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 21:45:13.546984 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 21:45:13.546990 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 21:45:13.546994 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 21:45:13.546999 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Apr 12 21:45:13.547004 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Apr 12 21:45:13.547009 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Apr 12 21:45:13.547013 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Apr 12 21:45:13.547018 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Apr 12 21:45:13.547022 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Apr 12 21:45:13.547028 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Apr 12 21:45:13.547033 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Apr 12 21:45:13.547037 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Apr 12 21:45:13.547042 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Apr 12 21:45:13.547047 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Apr 12 21:45:13.547051 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Apr 12 21:45:13.547056 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Apr 12 21:45:13.547061 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Apr 12 21:45:13.547066 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Apr 12 21:45:13.547071 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Apr 12 21:45:13.547076 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Apr 12 21:45:13.547080 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Apr 12 21:45:13.547085 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Apr 12 21:45:13.547090 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Apr 12 21:45:13.547094 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Apr 12 21:45:13.547099 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Apr 12 21:45:13.547104 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Apr 12 21:45:13.547108 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Apr 12 21:45:13.547114 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Apr 12 21:45:13.547118 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Apr 12 21:45:13.547123 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Apr 12 21:45:13.547127 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Apr 12 21:45:13.547132 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Apr 12 21:45:13.547137 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Apr 12 21:45:13.547141 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Apr 12 21:45:13.547146 kernel: No NUMA configuration found Apr 12 21:45:13.547151 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Apr 12 21:45:13.547156 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Apr 12 21:45:13.547161 kernel: Zone ranges: Apr 12 21:45:13.547165 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 21:45:13.547170 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 21:45:13.547175 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Apr 12 21:45:13.547180 kernel: Movable zone start for each node Apr 12 21:45:13.547184 kernel: Early memory node ranges Apr 12 21:45:13.547189 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 21:45:13.547194 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 21:45:13.547198 kernel: node 0: [mem 0x0000000040400000-0x00000000825d8fff] Apr 12 21:45:13.547204 kernel: node 0: [mem 0x00000000825db000-0x000000008afccfff] Apr 12 21:45:13.547208 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Apr 12 21:45:13.547213 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Apr 12 21:45:13.547217 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Apr 12 21:45:13.547222 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Apr 12 21:45:13.547229 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 21:45:13.547254 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 21:45:13.547260 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 21:45:13.547265 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 21:45:13.547270 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Apr 12 21:45:13.547276 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Apr 12 21:45:13.547295 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Apr 12 21:45:13.547300 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Apr 12 21:45:13.547305 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 21:45:13.547310 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 21:45:13.547315 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 21:45:13.547320 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 21:45:13.547326 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 21:45:13.547331 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 21:45:13.547336 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 21:45:13.547341 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 21:45:13.547346 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 21:45:13.547351 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 21:45:13.547356 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 21:45:13.547361 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 21:45:13.547365 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 21:45:13.547371 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 21:45:13.547376 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 21:45:13.547381 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 21:45:13.547386 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 21:45:13.547391 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 21:45:13.547396 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 21:45:13.547401 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 21:45:13.547406 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 21:45:13.547411 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 21:45:13.547417 kernel: TSC deadline timer available Apr 12 21:45:13.547422 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 21:45:13.547427 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Apr 12 21:45:13.547432 kernel: Booting paravirtualized kernel on bare hardware Apr 12 21:45:13.547437 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 21:45:13.547442 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 21:45:13.547447 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 21:45:13.547452 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 21:45:13.547457 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 21:45:13.547463 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Apr 12 21:45:13.547467 kernel: Policy zone: Normal Apr 12 21:45:13.547473 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:45:13.547478 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 21:45:13.547483 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 21:45:13.547488 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 21:45:13.547493 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 21:45:13.547499 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 730116K reserved, 0K cma-reserved) Apr 12 21:45:13.547505 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 21:45:13.547510 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 21:45:13.547515 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 21:45:13.547520 kernel: rcu: Hierarchical RCU implementation. Apr 12 21:45:13.547525 kernel: rcu: RCU event tracing is enabled. Apr 12 21:45:13.547530 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 21:45:13.547535 kernel: Rude variant of Tasks RCU enabled. Apr 12 21:45:13.547540 kernel: Tracing variant of Tasks RCU enabled. Apr 12 21:45:13.547546 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 21:45:13.547551 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 21:45:13.547556 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 21:45:13.547561 kernel: random: crng init done Apr 12 21:45:13.547566 kernel: Console: colour dummy device 80x25 Apr 12 21:45:13.547571 kernel: printk: console [tty0] enabled Apr 12 21:45:13.547576 kernel: printk: console [ttyS1] enabled Apr 12 21:45:13.547581 kernel: ACPI: Core revision 20210730 Apr 12 21:45:13.547586 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Apr 12 21:45:13.547591 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 21:45:13.547597 kernel: DMAR: Host address width 39 Apr 12 21:45:13.547602 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 21:45:13.547607 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 21:45:13.547612 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Apr 12 21:45:13.547617 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Apr 12 21:45:13.547622 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 21:45:13.547627 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 21:45:13.547632 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 21:45:13.547638 kernel: x2apic enabled Apr 12 21:45:13.547643 kernel: Switched APIC routing to cluster x2apic. Apr 12 21:45:13.547648 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 21:45:13.547653 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 21:45:13.547659 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 21:45:13.547664 kernel: process: using mwait in idle threads Apr 12 21:45:13.547668 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 21:45:13.547673 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 21:45:13.547678 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 21:45:13.547683 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 21:45:13.547689 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 21:45:13.547694 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 21:45:13.547699 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 21:45:13.547704 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 21:45:13.547709 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 21:45:13.547714 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 21:45:13.547718 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 21:45:13.547723 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 21:45:13.547728 kernel: TAA: Mitigation: TSX disabled Apr 12 21:45:13.547733 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 21:45:13.547738 kernel: SRBDS: Mitigation: Microcode Apr 12 21:45:13.547744 kernel: GDS: Vulnerable: No microcode Apr 12 21:45:13.547749 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 21:45:13.547754 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 21:45:13.547758 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 21:45:13.547763 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 21:45:13.547768 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 21:45:13.547773 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 21:45:13.547778 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 21:45:13.547783 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 21:45:13.547788 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 21:45:13.547793 kernel: Freeing SMP alternatives memory: 32K Apr 12 21:45:13.547798 kernel: pid_max: default: 32768 minimum: 301 Apr 12 21:45:13.547803 kernel: LSM: Security Framework initializing Apr 12 21:45:13.547808 kernel: SELinux: Initializing. Apr 12 21:45:13.547813 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 21:45:13.547818 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 21:45:13.547823 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 21:45:13.547828 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 21:45:13.547833 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 21:45:13.547838 kernel: ... version: 4 Apr 12 21:45:13.547843 kernel: ... bit width: 48 Apr 12 21:45:13.547848 kernel: ... generic registers: 4 Apr 12 21:45:13.547853 kernel: ... value mask: 0000ffffffffffff Apr 12 21:45:13.547858 kernel: ... max period: 00007fffffffffff Apr 12 21:45:13.547863 kernel: ... fixed-purpose events: 3 Apr 12 21:45:13.547868 kernel: ... event mask: 000000070000000f Apr 12 21:45:13.547873 kernel: signal: max sigframe size: 2032 Apr 12 21:45:13.547878 kernel: rcu: Hierarchical SRCU implementation. Apr 12 21:45:13.547883 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 21:45:13.547888 kernel: smp: Bringing up secondary CPUs ... Apr 12 21:45:13.547893 kernel: x86: Booting SMP configuration: Apr 12 21:45:13.547899 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 21:45:13.547904 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 21:45:13.547909 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 21:45:13.547914 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 21:45:13.547919 kernel: smpboot: Max logical packages: 1 Apr 12 21:45:13.547924 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 21:45:13.547929 kernel: devtmpfs: initialized Apr 12 21:45:13.547934 kernel: x86/mm: Memory block size: 128MB Apr 12 21:45:13.547939 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x825d9000-0x825d9fff] (4096 bytes) Apr 12 21:45:13.547945 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Apr 12 21:45:13.547950 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 21:45:13.547955 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 21:45:13.547960 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 21:45:13.547965 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 21:45:13.547970 kernel: audit: initializing netlink subsys (disabled) Apr 12 21:45:13.547975 kernel: audit: type=2000 audit(1712958308.041:1): state=initialized audit_enabled=0 res=1 Apr 12 21:45:13.547980 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 21:45:13.547985 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 21:45:13.547991 kernel: cpuidle: using governor menu Apr 12 21:45:13.547996 kernel: ACPI: bus type PCI registered Apr 12 21:45:13.548001 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 21:45:13.548006 kernel: dca service started, version 1.12.1 Apr 12 21:45:13.548011 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 21:45:13.548016 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 21:45:13.548021 kernel: PCI: Using configuration type 1 for base access Apr 12 21:45:13.548026 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 21:45:13.548031 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 21:45:13.548037 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 21:45:13.548042 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 21:45:13.548047 kernel: ACPI: Added _OSI(Module Device) Apr 12 21:45:13.548052 kernel: ACPI: Added _OSI(Processor Device) Apr 12 21:45:13.548057 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 21:45:13.548062 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 21:45:13.548067 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 21:45:13.548072 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 21:45:13.548077 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 21:45:13.548082 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 21:45:13.548087 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:45:13.548092 kernel: ACPI: SSDT 0xFFFF8FBD80220100 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 21:45:13.548097 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 21:45:13.548102 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:45:13.548107 kernel: ACPI: SSDT 0xFFFF8FBD81AEB400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 21:45:13.548112 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:45:13.548117 kernel: ACPI: SSDT 0xFFFF8FBD81A67000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 21:45:13.548122 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:45:13.548128 kernel: ACPI: SSDT 0xFFFF8FBD81B55000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 21:45:13.548133 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:45:13.548138 kernel: ACPI: SSDT 0xFFFF8FBD80156000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 21:45:13.548143 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:45:13.548148 kernel: ACPI: SSDT 0xFFFF8FBD81AE8400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 21:45:13.548153 kernel: ACPI: Interpreter enabled Apr 12 21:45:13.548158 kernel: ACPI: PM: (supports S0 S5) Apr 12 21:45:13.548163 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 21:45:13.548168 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 21:45:13.548173 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 21:45:13.548178 kernel: HEST: Table parsing has been initialized. Apr 12 21:45:13.548183 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 21:45:13.548188 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 21:45:13.548193 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 21:45:13.548198 kernel: ACPI: PM: Power Resource [USBC] Apr 12 21:45:13.548203 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 21:45:13.548208 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 21:45:13.548213 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 21:45:13.548218 kernel: ACPI: PM: Power Resource [WRST] Apr 12 21:45:13.548224 kernel: ACPI: PM: Power Resource [FN00] Apr 12 21:45:13.548249 kernel: ACPI: PM: Power Resource [FN01] Apr 12 21:45:13.548254 kernel: ACPI: PM: Power Resource [FN02] Apr 12 21:45:13.548259 kernel: ACPI: PM: Power Resource [FN03] Apr 12 21:45:13.548264 kernel: ACPI: PM: Power Resource [FN04] Apr 12 21:45:13.548269 kernel: ACPI: PM: Power Resource [PIN] Apr 12 21:45:13.548288 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 21:45:13.548353 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:45:13.548401 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 21:45:13.548443 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 21:45:13.548450 kernel: PCI host bridge to bus 0000:00 Apr 12 21:45:13.548494 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 21:45:13.548532 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 21:45:13.548570 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 21:45:13.548607 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Apr 12 21:45:13.548646 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 21:45:13.548682 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 21:45:13.548734 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 21:45:13.548785 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 21:45:13.548830 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.548877 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 21:45:13.548922 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Apr 12 21:45:13.548969 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 21:45:13.549013 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Apr 12 21:45:13.549061 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 21:45:13.549104 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Apr 12 21:45:13.549148 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 21:45:13.549196 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 21:45:13.549260 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Apr 12 21:45:13.549302 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Apr 12 21:45:13.549349 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 21:45:13.549391 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:45:13.549440 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 21:45:13.549485 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:45:13.549532 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 21:45:13.549575 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Apr 12 21:45:13.549616 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 21:45:13.549663 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 21:45:13.549706 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Apr 12 21:45:13.549749 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 21:45:13.549797 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 21:45:13.549840 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Apr 12 21:45:13.549881 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 21:45:13.549927 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 21:45:13.549970 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Apr 12 21:45:13.550015 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Apr 12 21:45:13.550063 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Apr 12 21:45:13.550108 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Apr 12 21:45:13.550151 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Apr 12 21:45:13.550194 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Apr 12 21:45:13.550239 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 21:45:13.550286 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 21:45:13.550331 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.550379 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 21:45:13.550425 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.550474 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 21:45:13.550518 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.550565 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 21:45:13.550609 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.550658 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Apr 12 21:45:13.550702 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.550750 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 21:45:13.550795 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:45:13.550843 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 21:45:13.550891 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 21:45:13.550934 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Apr 12 21:45:13.550977 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 21:45:13.551026 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 21:45:13.551070 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 21:45:13.551122 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 21:45:13.551168 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 21:45:13.551213 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Apr 12 21:45:13.551260 kernel: pci 0000:01:00.0: PME# supported from D3cold Apr 12 21:45:13.551306 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 21:45:13.551349 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:45:13.551400 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 21:45:13.551447 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 21:45:13.551506 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Apr 12 21:45:13.551549 kernel: pci 0000:01:00.1: PME# supported from D3cold Apr 12 21:45:13.551592 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 21:45:13.551635 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:45:13.551678 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:45:13.551721 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 21:45:13.551765 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:45:13.551810 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 21:45:13.551858 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Apr 12 21:45:13.551903 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Apr 12 21:45:13.551946 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Apr 12 21:45:13.551990 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 21:45:13.552033 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Apr 12 21:45:13.552078 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.552123 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 21:45:13.552165 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 21:45:13.552208 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 21:45:13.552299 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 21:45:13.552344 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 21:45:13.552388 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Apr 12 21:45:13.552431 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 21:45:13.552477 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Apr 12 21:45:13.552521 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:45:13.552565 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 21:45:13.552608 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 21:45:13.552650 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 21:45:13.552692 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 21:45:13.552741 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 21:45:13.552786 kernel: pci 0000:06:00.0: enabling Extended Tags Apr 12 21:45:13.552832 kernel: pci 0000:06:00.0: supports D1 D2 Apr 12 21:45:13.552876 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:45:13.552918 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 21:45:13.552961 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 21:45:13.553043 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:45:13.553114 kernel: pci_bus 0000:07: extended config space not accessible Apr 12 21:45:13.553165 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 21:45:13.553214 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Apr 12 21:45:13.553283 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Apr 12 21:45:13.553348 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 21:45:13.553394 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 21:45:13.553439 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 21:45:13.553489 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:45:13.553533 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 21:45:13.553579 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 21:45:13.553623 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:45:13.553630 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 21:45:13.553636 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 21:45:13.553641 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 21:45:13.553647 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 21:45:13.553652 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 21:45:13.553657 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 21:45:13.553662 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 21:45:13.553669 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 21:45:13.553674 kernel: iommu: Default domain type: Translated Apr 12 21:45:13.553680 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 21:45:13.553725 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Apr 12 21:45:13.553770 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 21:45:13.553817 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Apr 12 21:45:13.553825 kernel: vgaarb: loaded Apr 12 21:45:13.553831 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 21:45:13.553837 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 21:45:13.553842 kernel: PTP clock support registered Apr 12 21:45:13.553848 kernel: PCI: Using ACPI for IRQ routing Apr 12 21:45:13.553853 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 21:45:13.553858 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 21:45:13.553864 kernel: e820: reserve RAM buffer [mem 0x825d9000-0x83ffffff] Apr 12 21:45:13.553869 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Apr 12 21:45:13.553874 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Apr 12 21:45:13.553879 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Apr 12 21:45:13.553885 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Apr 12 21:45:13.553890 kernel: clocksource: Switched to clocksource tsc-early Apr 12 21:45:13.553896 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 21:45:13.553901 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 21:45:13.553906 kernel: pnp: PnP ACPI init Apr 12 21:45:13.553950 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 21:45:13.553995 kernel: pnp 00:02: [dma 0 disabled] Apr 12 21:45:13.554037 kernel: pnp 00:03: [dma 0 disabled] Apr 12 21:45:13.554083 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 21:45:13.554122 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 21:45:13.554163 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 21:45:13.554204 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 21:45:13.554269 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 21:45:13.554325 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 21:45:13.554366 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 21:45:13.554403 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 21:45:13.554442 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 21:45:13.554479 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 21:45:13.554517 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 21:45:13.554558 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 21:45:13.554597 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 21:45:13.554636 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 21:45:13.554673 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 21:45:13.554711 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 21:45:13.554749 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 21:45:13.554786 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 21:45:13.554828 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 21:45:13.554836 kernel: pnp: PnP ACPI: found 10 devices Apr 12 21:45:13.554843 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 21:45:13.554848 kernel: NET: Registered PF_INET protocol family Apr 12 21:45:13.554854 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:45:13.554859 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 21:45:13.554864 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 21:45:13.554870 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:45:13.554875 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 21:45:13.554881 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 21:45:13.554886 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 21:45:13.554892 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 21:45:13.554897 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 21:45:13.554903 kernel: NET: Registered PF_XDP protocol family Apr 12 21:45:13.554947 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Apr 12 21:45:13.554989 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Apr 12 21:45:13.555031 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Apr 12 21:45:13.555076 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 21:45:13.555121 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 21:45:13.555168 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 21:45:13.555212 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 21:45:13.555283 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:45:13.555341 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Apr 12 21:45:13.555385 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:45:13.555427 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Apr 12 21:45:13.555472 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Apr 12 21:45:13.555514 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 21:45:13.555556 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Apr 12 21:45:13.555599 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Apr 12 21:45:13.555642 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 21:45:13.555685 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Apr 12 21:45:13.555727 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 12 21:45:13.555774 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Apr 12 21:45:13.555817 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Apr 12 21:45:13.555862 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:45:13.555905 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Apr 12 21:45:13.555947 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Apr 12 21:45:13.555990 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Apr 12 21:45:13.556028 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 21:45:13.556066 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 21:45:13.556104 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 21:45:13.556143 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 21:45:13.556179 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Apr 12 21:45:13.556216 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 21:45:13.556287 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Apr 12 21:45:13.556348 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:45:13.556395 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Apr 12 21:45:13.556436 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Apr 12 21:45:13.556480 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Apr 12 21:45:13.556520 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Apr 12 21:45:13.556562 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Apr 12 21:45:13.556602 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Apr 12 21:45:13.556644 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 21:45:13.556686 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Apr 12 21:45:13.556694 kernel: PCI: CLS 64 bytes, default 64 Apr 12 21:45:13.556700 kernel: DMAR: No ATSR found Apr 12 21:45:13.556705 kernel: DMAR: No SATC found Apr 12 21:45:13.556711 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 21:45:13.556754 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 21:45:13.556797 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 21:45:13.556840 kernel: pci 0000:00:08.0: Adding to iommu group 2 Apr 12 21:45:13.556883 kernel: pci 0000:00:12.0: Adding to iommu group 3 Apr 12 21:45:13.556927 kernel: pci 0000:00:14.0: Adding to iommu group 4 Apr 12 21:45:13.556969 kernel: pci 0000:00:14.2: Adding to iommu group 4 Apr 12 21:45:13.557011 kernel: pci 0000:00:15.0: Adding to iommu group 5 Apr 12 21:45:13.557053 kernel: pci 0000:00:15.1: Adding to iommu group 5 Apr 12 21:45:13.557096 kernel: pci 0000:00:16.0: Adding to iommu group 6 Apr 12 21:45:13.557137 kernel: pci 0000:00:16.1: Adding to iommu group 6 Apr 12 21:45:13.557179 kernel: pci 0000:00:16.4: Adding to iommu group 6 Apr 12 21:45:13.557221 kernel: pci 0000:00:17.0: Adding to iommu group 7 Apr 12 21:45:13.557306 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Apr 12 21:45:13.557352 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Apr 12 21:45:13.557395 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Apr 12 21:45:13.557437 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Apr 12 21:45:13.557479 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Apr 12 21:45:13.557522 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Apr 12 21:45:13.557564 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Apr 12 21:45:13.557607 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Apr 12 21:45:13.557649 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Apr 12 21:45:13.557696 kernel: pci 0000:01:00.0: Adding to iommu group 1 Apr 12 21:45:13.557740 kernel: pci 0000:01:00.1: Adding to iommu group 1 Apr 12 21:45:13.557784 kernel: pci 0000:03:00.0: Adding to iommu group 15 Apr 12 21:45:13.557829 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 21:45:13.557872 kernel: pci 0000:06:00.0: Adding to iommu group 17 Apr 12 21:45:13.557919 kernel: pci 0000:07:00.0: Adding to iommu group 17 Apr 12 21:45:13.557927 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 21:45:13.557932 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 21:45:13.557939 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Apr 12 21:45:13.557944 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Apr 12 21:45:13.557950 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 21:45:13.557955 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 21:45:13.557960 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 21:45:13.558006 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 21:45:13.558014 kernel: Initialise system trusted keyrings Apr 12 21:45:13.558019 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 21:45:13.558026 kernel: Key type asymmetric registered Apr 12 21:45:13.558031 kernel: Asymmetric key parser 'x509' registered Apr 12 21:45:13.558036 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 21:45:13.558041 kernel: io scheduler mq-deadline registered Apr 12 21:45:13.558047 kernel: io scheduler kyber registered Apr 12 21:45:13.558052 kernel: io scheduler bfq registered Apr 12 21:45:13.558095 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Apr 12 21:45:13.558138 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Apr 12 21:45:13.558182 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Apr 12 21:45:13.558226 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Apr 12 21:45:13.558309 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Apr 12 21:45:13.558353 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Apr 12 21:45:13.558400 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 21:45:13.558407 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 21:45:13.558413 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 21:45:13.558418 kernel: pstore: Registered erst as persistent store backend Apr 12 21:45:13.558425 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 21:45:13.558430 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 21:45:13.558436 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 21:45:13.558441 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 21:45:13.558447 kernel: hpet_acpi_add: no address or irqs in _CRS Apr 12 21:45:13.558493 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 21:45:13.558501 kernel: i8042: PNP: No PS/2 controller found. Apr 12 21:45:13.558539 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 21:45:13.558581 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 21:45:13.558619 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T21:45:12 UTC (1712958312) Apr 12 21:45:13.558659 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 21:45:13.558666 kernel: fail to initialize ptp_kvm Apr 12 21:45:13.558671 kernel: intel_pstate: Intel P-state driver initializing Apr 12 21:45:13.558677 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 21:45:13.558682 kernel: intel_pstate: HWP enabled Apr 12 21:45:13.558688 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 21:45:13.558693 kernel: vesafb: scrolling: redraw Apr 12 21:45:13.558700 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 21:45:13.558705 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000023d49d0f, using 768k, total 768k Apr 12 21:45:13.558710 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 21:45:13.558716 kernel: fb0: VESA VGA frame buffer device Apr 12 21:45:13.558721 kernel: NET: Registered PF_INET6 protocol family Apr 12 21:45:13.558726 kernel: Segment Routing with IPv6 Apr 12 21:45:13.558732 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 21:45:13.558737 kernel: NET: Registered PF_PACKET protocol family Apr 12 21:45:13.558743 kernel: Key type dns_resolver registered Apr 12 21:45:13.558749 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 21:45:13.558754 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 21:45:13.558759 kernel: IPI shorthand broadcast: enabled Apr 12 21:45:13.558765 kernel: sched_clock: Marking stable (1682511374, 1339911629)->(4465575126, -1443152123) Apr 12 21:45:13.558770 kernel: registered taskstats version 1 Apr 12 21:45:13.558775 kernel: Loading compiled-in X.509 certificates Apr 12 21:45:13.558781 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 21:45:13.558786 kernel: Key type .fscrypt registered Apr 12 21:45:13.558791 kernel: Key type fscrypt-provisioning registered Apr 12 21:45:13.558797 kernel: pstore: Using crash dump compression: deflate Apr 12 21:45:13.558803 kernel: ima: Allocated hash algorithm: sha1 Apr 12 21:45:13.558808 kernel: ima: No architecture policies found Apr 12 21:45:13.558814 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 21:45:13.558819 kernel: Write protecting the kernel read-only data: 28672k Apr 12 21:45:13.558824 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 21:45:13.558830 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 21:45:13.558835 kernel: Run /init as init process Apr 12 21:45:13.558840 kernel: with arguments: Apr 12 21:45:13.558846 kernel: /init Apr 12 21:45:13.558852 kernel: with environment: Apr 12 21:45:13.558857 kernel: HOME=/ Apr 12 21:45:13.558862 kernel: TERM=linux Apr 12 21:45:13.558867 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 21:45:13.558873 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:45:13.558880 systemd[1]: Detected architecture x86-64. Apr 12 21:45:13.558887 systemd[1]: Running in initrd. Apr 12 21:45:13.558892 systemd[1]: No hostname configured, using default hostname. Apr 12 21:45:13.558898 systemd[1]: Hostname set to . Apr 12 21:45:13.558903 systemd[1]: Initializing machine ID from random generator. Apr 12 21:45:13.558909 systemd[1]: Queued start job for default target initrd.target. Apr 12 21:45:13.558915 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:45:13.558920 systemd[1]: Reached target cryptsetup.target. Apr 12 21:45:13.558926 systemd[1]: Reached target paths.target. Apr 12 21:45:13.558931 systemd[1]: Reached target slices.target. Apr 12 21:45:13.558937 systemd[1]: Reached target swap.target. Apr 12 21:45:13.558943 systemd[1]: Reached target timers.target. Apr 12 21:45:13.558948 systemd[1]: Listening on iscsid.socket. Apr 12 21:45:13.558954 systemd[1]: Listening on iscsiuio.socket. Apr 12 21:45:13.558960 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 21:45:13.558965 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 21:45:13.558971 systemd[1]: Listening on systemd-journald.socket. Apr 12 21:45:13.558977 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Apr 12 21:45:13.558983 systemd[1]: Listening on systemd-networkd.socket. Apr 12 21:45:13.558988 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Apr 12 21:45:13.558994 kernel: clocksource: Switched to clocksource tsc Apr 12 21:45:13.558999 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:45:13.559005 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:45:13.559010 systemd[1]: Reached target sockets.target. Apr 12 21:45:13.559016 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:45:13.559021 systemd[1]: Finished network-cleanup.service. Apr 12 21:45:13.559028 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 21:45:13.559033 systemd[1]: Starting systemd-journald.service... Apr 12 21:45:13.559039 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:45:13.559046 systemd-journald[267]: Journal started Apr 12 21:45:13.559072 systemd-journald[267]: Runtime Journal (/run/log/journal/bd21982a3719433bac43fa11ae1fa2b9) is 8.0M, max 640.1M, 632.1M free. Apr 12 21:45:13.561951 systemd-modules-load[268]: Inserted module 'overlay' Apr 12 21:45:13.621330 kernel: audit: type=1334 audit(1712958313.567:2): prog-id=6 op=LOAD Apr 12 21:45:13.621342 systemd[1]: Starting systemd-resolved.service... Apr 12 21:45:13.621350 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 21:45:13.567000 audit: BPF prog-id=6 op=LOAD Apr 12 21:45:13.655286 kernel: Bridge firewalling registered Apr 12 21:45:13.655301 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 21:45:13.670602 systemd-modules-load[268]: Inserted module 'br_netfilter' Apr 12 21:45:13.708269 systemd[1]: Started systemd-journald.service. Apr 12 21:45:13.708281 kernel: SCSI subsystem initialized Apr 12 21:45:13.673078 systemd-resolved[270]: Positive Trust Anchors: Apr 12 21:45:13.829470 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 21:45:13.829483 kernel: audit: type=1130 audit(1712958313.727:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.829491 kernel: device-mapper: uevent: version 1.0.3 Apr 12 21:45:13.829498 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 21:45:13.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.673085 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 21:45:13.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.673105 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 21:45:13.954457 kernel: audit: type=1130 audit(1712958313.838:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.954470 kernel: audit: type=1130 audit(1712958313.889:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.674657 systemd-resolved[270]: Defaulting to hostname 'linux'. Apr 12 21:45:14.006339 kernel: audit: type=1130 audit(1712958313.963:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.727587 systemd[1]: Started systemd-resolved.service. Apr 12 21:45:14.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.824578 systemd-modules-load[268]: Inserted module 'dm_multipath' Apr 12 21:45:14.114269 kernel: audit: type=1130 audit(1712958314.015:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.114296 kernel: audit: type=1130 audit(1712958314.068:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:13.838572 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:45:13.889540 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 21:45:13.983638 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:45:14.015546 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 21:45:14.068535 systemd[1]: Reached target nss-lookup.target. Apr 12 21:45:14.123947 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 21:45:14.130890 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:45:14.144923 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 21:45:14.145618 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:45:14.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.147728 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 21:45:14.256231 kernel: audit: type=1130 audit(1712958314.144:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.256242 kernel: audit: type=1130 audit(1712958314.207:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.207588 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 21:45:14.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.264897 systemd[1]: Starting dracut-cmdline.service... Apr 12 21:45:14.286348 dracut-cmdline[292]: dracut-dracut-053 Apr 12 21:45:14.286348 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 21:45:14.286348 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:45:14.355314 kernel: Loading iSCSI transport class v2.0-870. Apr 12 21:45:14.355327 kernel: iscsi: registered transport (tcp) Apr 12 21:45:14.411436 kernel: iscsi: registered transport (qla4xxx) Apr 12 21:45:14.411487 kernel: QLogic iSCSI HBA Driver Apr 12 21:45:14.427814 systemd[1]: Finished dracut-cmdline.service. Apr 12 21:45:14.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:14.437952 systemd[1]: Starting dracut-pre-udev.service... Apr 12 21:45:14.494294 kernel: raid6: avx2x4 gen() 46729 MB/s Apr 12 21:45:14.529299 kernel: raid6: avx2x4 xor() 20220 MB/s Apr 12 21:45:14.564265 kernel: raid6: avx2x2 gen() 53853 MB/s Apr 12 21:45:14.599269 kernel: raid6: avx2x2 xor() 32027 MB/s Apr 12 21:45:14.634303 kernel: raid6: avx2x1 gen() 45235 MB/s Apr 12 21:45:14.668299 kernel: raid6: avx2x1 xor() 27850 MB/s Apr 12 21:45:14.702266 kernel: raid6: sse2x4 gen() 21355 MB/s Apr 12 21:45:14.736304 kernel: raid6: sse2x4 xor() 11985 MB/s Apr 12 21:45:14.770303 kernel: raid6: sse2x2 gen() 21662 MB/s Apr 12 21:45:14.804303 kernel: raid6: sse2x2 xor() 13346 MB/s Apr 12 21:45:14.838300 kernel: raid6: sse2x1 gen() 18306 MB/s Apr 12 21:45:14.889720 kernel: raid6: sse2x1 xor() 8930 MB/s Apr 12 21:45:14.889736 kernel: raid6: using algorithm avx2x2 gen() 53853 MB/s Apr 12 21:45:14.889743 kernel: raid6: .... xor() 32027 MB/s, rmw enabled Apr 12 21:45:14.907708 kernel: raid6: using avx2x2 recovery algorithm Apr 12 21:45:14.953232 kernel: xor: automatically using best checksumming function avx Apr 12 21:45:15.032268 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 21:45:15.037205 systemd[1]: Finished dracut-pre-udev.service. Apr 12 21:45:15.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:15.047000 audit: BPF prog-id=7 op=LOAD Apr 12 21:45:15.047000 audit: BPF prog-id=8 op=LOAD Apr 12 21:45:15.048205 systemd[1]: Starting systemd-udevd.service... Apr 12 21:45:15.056782 systemd-udevd[471]: Using default interface naming scheme 'v252'. Apr 12 21:45:15.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:15.062389 systemd[1]: Started systemd-udevd.service. Apr 12 21:45:15.105354 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Apr 12 21:45:15.080912 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 21:45:15.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:15.111876 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 21:45:15.122627 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:45:15.174039 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:45:15.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:15.202242 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 21:45:15.204241 kernel: libata version 3.00 loaded. Apr 12 21:45:15.239248 kernel: ACPI: bus type USB registered Apr 12 21:45:15.239291 kernel: usbcore: registered new interface driver usbfs Apr 12 21:45:15.239300 kernel: usbcore: registered new interface driver hub Apr 12 21:45:15.274298 kernel: usbcore: registered new device driver usb Apr 12 21:45:15.275235 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 21:45:15.308606 kernel: AES CTR mode by8 optimization enabled Apr 12 21:45:15.309300 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 21:45:15.309322 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Apr 12 21:45:15.344008 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 21:45:15.360927 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 21:45:15.382235 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 21:45:15.401234 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 21:45:15.401310 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Apr 12 21:45:15.401366 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 21:45:15.401419 kernel: pps pps0: new PPS source ptp0 Apr 12 21:45:15.401481 kernel: igb 0000:03:00.0: added PHC on eth0 Apr 12 21:45:15.401540 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:45:15.401592 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:bc Apr 12 21:45:15.401643 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Apr 12 21:45:15.401693 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 21:45:15.419767 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 21:45:15.442232 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 21:45:15.442304 kernel: pps pps1: new PPS source ptp1 Apr 12 21:45:15.442366 kernel: igb 0000:04:00.0: added PHC on eth1 Apr 12 21:45:15.442426 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:45:15.442479 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:f0:bd Apr 12 21:45:15.442531 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Apr 12 21:45:15.442582 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 21:45:15.472233 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Apr 12 21:45:15.472333 kernel: scsi host0: ahci Apr 12 21:45:15.472399 kernel: scsi host1: ahci Apr 12 21:45:15.472455 kernel: scsi host2: ahci Apr 12 21:45:15.472510 kernel: scsi host3: ahci Apr 12 21:45:15.472562 kernel: scsi host4: ahci Apr 12 21:45:15.472616 kernel: scsi host5: ahci Apr 12 21:45:15.472668 kernel: scsi host6: ahci Apr 12 21:45:15.472718 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Apr 12 21:45:15.472728 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Apr 12 21:45:15.472735 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Apr 12 21:45:15.472741 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Apr 12 21:45:15.472747 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Apr 12 21:45:15.472754 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Apr 12 21:45:15.472760 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Apr 12 21:45:15.485272 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 21:45:15.666305 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 21:45:15.666382 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 21:45:15.799849 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 21:45:15.799868 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 21:45:15.799936 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 21:45:15.830135 kernel: hub 1-0:1.0: USB hub found Apr 12 21:45:15.830219 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 21:45:15.857864 kernel: hub 1-0:1.0: 16 ports detected Apr 12 21:45:15.857941 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 21:45:15.860276 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Apr 12 21:45:15.890234 kernel: hub 2-0:1.0: USB hub found Apr 12 21:45:15.890318 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 21:45:15.918237 kernel: hub 2-0:1.0: 10 ports detected Apr 12 21:45:15.918314 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 21:45:15.923232 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:45:16.066308 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 21:45:16.080293 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 21:45:16.109280 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 21:45:16.122282 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 21:45:16.122298 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 21:45:16.122368 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 21:45:16.143312 kernel: ata1.00: Features: NCQ-prio Apr 12 21:45:16.159289 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Apr 12 21:45:16.185274 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 21:45:16.185290 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 21:45:16.185361 kernel: ata2.00: Features: NCQ-prio Apr 12 21:45:16.245269 kernel: ata1.00: configured for UDMA/133 Apr 12 21:45:16.262239 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 21:45:16.276276 kernel: ata2.00: configured for UDMA/133 Apr 12 21:45:16.276311 kernel: hub 1-14:1.0: USB hub found Apr 12 21:45:16.276388 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 21:45:16.305367 kernel: hub 1-14:1.0: 4 ports detected Apr 12 21:45:16.338357 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:16.338375 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:45:16.351994 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 21:45:16.352071 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 21:45:16.385384 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 21:45:16.385459 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 21:45:16.399900 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 21:45:16.414511 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 21:45:16.428460 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 21:45:16.442184 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 21:45:16.442265 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 21:45:16.442326 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 21:45:16.493026 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:16.493045 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 21:45:16.512270 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:45:16.526855 kernel: port_module: 9 callbacks suppressed Apr 12 21:45:16.526872 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Apr 12 21:45:16.541541 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:45:16.558996 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:45:16.559071 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 21:45:16.561231 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 21:45:16.561247 kernel: GPT:9289727 != 937703087 Apr 12 21:45:16.561254 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 21:45:16.561264 kernel: GPT:9289727 != 937703087 Apr 12 21:45:16.561270 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 21:45:16.561276 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:45:16.561283 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:16.561289 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 21:45:16.607232 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 21:45:16.698631 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 21:45:16.827352 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (547) Apr 12 21:45:16.827369 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 21:45:16.827443 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Apr 12 21:45:16.827499 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 21:45:16.794270 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 21:45:16.879496 kernel: usbcore: registered new interface driver usbhid Apr 12 21:45:16.879509 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Apr 12 21:45:16.879585 kernel: usbhid: USB HID core driver Apr 12 21:45:16.801674 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 21:45:16.922303 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 21:45:16.849101 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 21:45:16.943325 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:16.912970 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:45:16.974275 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:45:16.974290 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:16.974299 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 21:45:16.924020 systemd[1]: Starting disk-uuid.service... Apr 12 21:45:17.028343 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 21:45:17.028392 disk-uuid[688]: Primary Header is updated. Apr 12 21:45:17.028392 disk-uuid[688]: Secondary Entries is updated. Apr 12 21:45:17.028392 disk-uuid[688]: Secondary Header is updated. Apr 12 21:45:17.106271 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 21:45:17.106353 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:45:17.106362 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:17.132280 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:45:18.112916 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:45:18.132142 disk-uuid[689]: The operation has completed successfully. Apr 12 21:45:18.140352 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:45:18.169812 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 21:45:18.267436 kernel: audit: type=1130 audit(1712958318.178:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.267450 kernel: audit: type=1131 audit(1712958318.178:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.169857 systemd[1]: Finished disk-uuid.service. Apr 12 21:45:18.297271 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 21:45:18.201640 systemd[1]: Starting verity-setup.service... Apr 12 21:45:18.327452 systemd[1]: Found device dev-mapper-usr.device. Apr 12 21:45:18.337464 systemd[1]: Mounting sysusr-usr.mount... Apr 12 21:45:18.351547 systemd[1]: Finished verity-setup.service. Apr 12 21:45:18.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.414234 kernel: audit: type=1130 audit(1712958318.366:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.442953 systemd[1]: Mounted sysusr-usr.mount. Apr 12 21:45:18.458331 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 21:45:18.451622 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 21:45:18.543539 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:45:18.543555 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:45:18.543562 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:45:18.543569 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:45:18.452028 systemd[1]: Starting ignition-setup.service... Apr 12 21:45:18.471577 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 21:45:18.624454 kernel: audit: type=1130 audit(1712958318.568:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.551693 systemd[1]: Finished ignition-setup.service. Apr 12 21:45:18.689326 kernel: audit: type=1130 audit(1712958318.633:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.568728 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 21:45:18.696000 audit: BPF prog-id=9 op=LOAD Apr 12 21:45:18.634263 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 21:45:18.735306 kernel: audit: type=1334 audit(1712958318.696:24): prog-id=9 op=LOAD Apr 12 21:45:18.698325 systemd[1]: Starting systemd-networkd.service... Apr 12 21:45:18.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.758015 ignition[867]: Ignition 2.14.0 Apr 12 21:45:18.808519 kernel: audit: type=1130 audit(1712958318.742:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.733573 systemd-networkd[879]: lo: Link UP Apr 12 21:45:18.758028 ignition[867]: Stage: fetch-offline Apr 12 21:45:18.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.733576 systemd-networkd[879]: lo: Gained carrier Apr 12 21:45:18.963507 kernel: audit: type=1130 audit(1712958318.829:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.963521 kernel: audit: type=1130 audit(1712958318.889:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.963529 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 21:45:18.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.758100 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:45:18.988697 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Apr 12 21:45:18.733858 systemd-networkd[879]: Enumeration completed Apr 12 21:45:18.758135 ignition[867]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:45:18.733928 systemd[1]: Started systemd-networkd.service. Apr 12 21:45:19.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.768381 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:45:18.734578 systemd-networkd[879]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:45:19.041383 iscsid[908]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:45:19.041383 iscsid[908]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 21:45:19.041383 iscsid[908]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 21:45:19.041383 iscsid[908]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 21:45:19.041383 iscsid[908]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 21:45:19.041383 iscsid[908]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:45:19.041383 iscsid[908]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 21:45:19.218420 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 21:45:19.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:19.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:18.768448 ignition[867]: parsed url from cmdline: "" Apr 12 21:45:18.743364 systemd[1]: Reached target network.target. Apr 12 21:45:18.768450 ignition[867]: no config URL provided Apr 12 21:45:18.788778 unknown[867]: fetched base config from "system" Apr 12 21:45:18.768453 ignition[867]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 21:45:18.788804 unknown[867]: fetched user config from "system" Apr 12 21:45:18.768481 ignition[867]: parsing config with SHA512: 1a9d04080894b4789837c38bfd34f993c771d051eaa24b0e271137bfefffeda23fcfa8cc44b8450202761d4e4f01dcaa10c4f746cffe3af520aae29cd654a1a1 Apr 12 21:45:18.803883 systemd[1]: Starting iscsiuio.service... Apr 12 21:45:18.789260 ignition[867]: fetch-offline: fetch-offline passed Apr 12 21:45:18.815597 systemd[1]: Started iscsiuio.service. Apr 12 21:45:18.789263 ignition[867]: POST message to Packet Timeline Apr 12 21:45:18.829632 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 21:45:18.789267 ignition[867]: POST Status error: resource requires networking Apr 12 21:45:18.889501 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 21:45:18.789319 ignition[867]: Ignition finished successfully Apr 12 21:45:18.889955 systemd[1]: Starting ignition-kargs.service... Apr 12 21:45:18.967863 ignition[897]: Ignition 2.14.0 Apr 12 21:45:18.964675 systemd-networkd[879]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:45:18.967866 ignition[897]: Stage: kargs Apr 12 21:45:18.977854 systemd[1]: Starting iscsid.service... Apr 12 21:45:18.967925 ignition[897]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:45:19.002467 systemd[1]: Started iscsid.service. Apr 12 21:45:18.967934 ignition[897]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:45:19.017724 systemd[1]: Starting dracut-initqueue.service... Apr 12 21:45:18.969236 ignition[897]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:45:19.031444 systemd[1]: Finished dracut-initqueue.service. Apr 12 21:45:18.971042 ignition[897]: kargs: kargs passed Apr 12 21:45:19.059481 systemd[1]: Reached target remote-fs-pre.target. Apr 12 21:45:18.971045 ignition[897]: POST message to Packet Timeline Apr 12 21:45:19.071514 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:45:18.971055 ignition[897]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:45:19.112474 systemd[1]: Reached target remote-fs.target. Apr 12 21:45:18.972266 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:54407->[::1]:53: read: connection refused Apr 12 21:45:19.134240 systemd[1]: Starting dracut-pre-mount.service... Apr 12 21:45:19.172735 ignition[897]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 21:45:19.164540 systemd[1]: Finished dracut-pre-mount.service. Apr 12 21:45:19.173212 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40650->[::1]:53: read: connection refused Apr 12 21:45:19.208485 systemd-networkd[879]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:45:19.236625 systemd-networkd[879]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:45:19.265861 systemd-networkd[879]: enp1s0f1np1: Link UP Apr 12 21:45:19.266163 systemd-networkd[879]: enp1s0f1np1: Gained carrier Apr 12 21:45:19.277776 systemd-networkd[879]: enp1s0f0np0: Link UP Apr 12 21:45:19.278140 systemd-networkd[879]: eno2: Link UP Apr 12 21:45:19.278500 systemd-networkd[879]: eno1: Link UP Apr 12 21:45:19.573954 ignition[897]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 21:45:19.575061 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:38703->[::1]:53: read: connection refused Apr 12 21:45:19.991035 systemd-networkd[879]: enp1s0f0np0: Gained carrier Apr 12 21:45:20.000482 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Apr 12 21:45:20.041449 systemd-networkd[879]: enp1s0f0np0: DHCPv4 address 145.40.90.149/31, gateway 145.40.90.148 acquired from 145.40.83.140 Apr 12 21:45:20.375588 ignition[897]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 21:45:20.376954 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:55304->[::1]:53: read: connection refused Apr 12 21:45:20.543801 systemd-networkd[879]: enp1s0f1np1: Gained IPv6LL Apr 12 21:45:21.503794 systemd-networkd[879]: enp1s0f0np0: Gained IPv6LL Apr 12 21:45:21.978655 ignition[897]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 21:45:21.980088 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58580->[::1]:53: read: connection refused Apr 12 21:45:25.183211 ignition[897]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 21:45:25.223422 ignition[897]: GET result: OK Apr 12 21:45:25.423771 ignition[897]: Ignition finished successfully Apr 12 21:45:25.425710 systemd[1]: Finished ignition-kargs.service. Apr 12 21:45:25.515593 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 21:45:25.515612 kernel: audit: type=1130 audit(1712958325.438:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:25.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:25.448238 ignition[926]: Ignition 2.14.0 Apr 12 21:45:25.440834 systemd[1]: Starting ignition-disks.service... Apr 12 21:45:25.448241 ignition[926]: Stage: disks Apr 12 21:45:25.448358 ignition[926]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:45:25.448366 ignition[926]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:45:25.450517 ignition[926]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:45:25.451197 ignition[926]: disks: disks passed Apr 12 21:45:25.451200 ignition[926]: POST message to Packet Timeline Apr 12 21:45:25.451211 ignition[926]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:45:25.474833 ignition[926]: GET result: OK Apr 12 21:45:25.662659 ignition[926]: Ignition finished successfully Apr 12 21:45:25.665820 systemd[1]: Finished ignition-disks.service. Apr 12 21:45:25.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:25.678740 systemd[1]: Reached target initrd-root-device.target. Apr 12 21:45:25.743516 kernel: audit: type=1130 audit(1712958325.677:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:25.743475 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:45:25.757464 systemd[1]: Reached target local-fs.target. Apr 12 21:45:25.757497 systemd[1]: Reached target sysinit.target. Apr 12 21:45:25.780438 systemd[1]: Reached target basic.target. Apr 12 21:45:25.794081 systemd[1]: Starting systemd-fsck-root.service... Apr 12 21:45:25.815961 systemd-fsck[940]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 21:45:25.828829 systemd[1]: Finished systemd-fsck-root.service. Apr 12 21:45:25.920901 kernel: audit: type=1130 audit(1712958325.837:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:25.920918 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 21:45:25.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:25.844000 systemd[1]: Mounting sysroot.mount... Apr 12 21:45:25.928891 systemd[1]: Mounted sysroot.mount. Apr 12 21:45:25.943566 systemd[1]: Reached target initrd-root-fs.target. Apr 12 21:45:25.951252 systemd[1]: Mounting sysroot-usr.mount... Apr 12 21:45:25.972108 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 21:45:25.988374 systemd[1]: Starting flatcar-static-network.service... Apr 12 21:45:26.002494 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 21:45:26.002672 systemd[1]: Reached target ignition-diskful.target. Apr 12 21:45:26.021438 systemd[1]: Mounted sysroot-usr.mount. Apr 12 21:45:26.046100 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:45:26.121345 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (949) Apr 12 21:45:26.121374 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:45:26.058197 systemd[1]: Starting initrd-setup-root.service... Apr 12 21:45:26.174095 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:45:26.174110 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:45:26.126591 systemd[1]: Finished initrd-setup-root.service. Apr 12 21:45:26.259496 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:45:26.259509 kernel: audit: type=1130 audit(1712958326.188:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.259545 coreos-metadata[947]: Apr 12 21:45:26.138 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:45:26.259545 coreos-metadata[947]: Apr 12 21:45:26.161 INFO Fetch successful Apr 12 21:45:26.259545 coreos-metadata[947]: Apr 12 21:45:26.179 INFO wrote hostname ci-3510.3.3-a-26e8ad9098 to /sysroot/etc/hostname Apr 12 21:45:26.470470 kernel: audit: type=1130 audit(1712958326.269:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.470484 kernel: audit: type=1130 audit(1712958326.334:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.470495 kernel: audit: type=1131 audit(1712958326.334:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.470559 coreos-metadata[948]: Apr 12 21:45:26.138 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:45:26.470559 coreos-metadata[948]: Apr 12 21:45:26.161 INFO Fetch successful Apr 12 21:45:26.490365 initrd-setup-root[956]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 21:45:26.189510 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 21:45:26.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.552492 initrd-setup-root[966]: cut: /sysroot/etc/group: No such file or directory Apr 12 21:45:26.591481 kernel: audit: type=1130 audit(1712958326.523:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.270526 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 21:45:26.601496 initrd-setup-root[974]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 21:45:26.270566 systemd[1]: Finished flatcar-static-network.service. Apr 12 21:45:26.620476 initrd-setup-root[982]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 21:45:26.334505 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:45:26.638447 ignition[1024]: INFO : Ignition 2.14.0 Apr 12 21:45:26.638447 ignition[1024]: INFO : Stage: mount Apr 12 21:45:26.638447 ignition[1024]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:45:26.638447 ignition[1024]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:45:26.638447 ignition[1024]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:45:26.638447 ignition[1024]: INFO : mount: mount passed Apr 12 21:45:26.638447 ignition[1024]: INFO : POST message to Packet Timeline Apr 12 21:45:26.638447 ignition[1024]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:45:26.638447 ignition[1024]: INFO : GET result: OK Apr 12 21:45:26.456863 systemd[1]: Starting ignition-mount.service... Apr 12 21:45:26.478817 systemd[1]: Starting sysroot-boot.service... Apr 12 21:45:26.506193 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 21:45:26.506246 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 21:45:26.506861 systemd[1]: Finished sysroot-boot.service. Apr 12 21:45:26.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.826506 ignition[1024]: INFO : Ignition finished successfully Apr 12 21:45:26.841329 kernel: audit: type=1130 audit(1712958326.768:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:26.759926 systemd[1]: Finished ignition-mount.service. Apr 12 21:45:26.771450 systemd[1]: Starting ignition-files.service... Apr 12 21:45:26.835063 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:45:26.938302 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1039) Apr 12 21:45:26.938314 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:45:26.938322 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:45:26.938328 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:45:26.938337 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:45:26.970099 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:45:26.991157 ignition[1058]: INFO : Ignition 2.14.0 Apr 12 21:45:26.991157 ignition[1058]: INFO : Stage: files Apr 12 21:45:27.006385 ignition[1058]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:45:27.006385 ignition[1058]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:45:27.006385 ignition[1058]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:45:27.006385 ignition[1058]: DEBUG : files: compiled without relabeling support, skipping Apr 12 21:45:27.006385 ignition[1058]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 21:45:27.006385 ignition[1058]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 21:45:27.006385 ignition[1058]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 21:45:27.006385 ignition[1058]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 21:45:27.006385 ignition[1058]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 21:45:27.006385 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 21:45:27.006385 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 21:45:27.005221 unknown[1058]: wrote ssh authorized keys file for user: core Apr 12 21:45:27.160557 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 21:45:27.160557 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 21:45:27.160557 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 21:45:27.160557 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 21:45:27.630887 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 21:45:27.727990 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 21:45:27.727990 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 21:45:27.771478 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 21:45:27.771478 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 21:45:28.126711 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 21:45:28.177931 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 21:45:28.177931 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 21:45:28.221453 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 21:45:28.221453 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 21:45:28.255350 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 21:45:28.933213 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 21:45:28.960457 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 21:45:28.960457 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 21:45:28.960457 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 21:45:29.009375 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 21:45:30.533643 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 21:45:30.559510 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 21:45:30.559510 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 21:45:30.559510 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Apr 12 21:45:30.610466 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 21:45:31.539290 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Apr 12 21:45:31.539290 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 21:45:31.601379 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1654578760" Apr 12 21:45:31.601379 ignition[1058]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1654578760": device or resource busy Apr 12 21:45:31.916250 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1060) Apr 12 21:45:31.916267 kernel: audit: type=1130 audit(1712958331.856:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.916306 ignition[1058]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1654578760", trying btrfs: device or resource busy Apr 12 21:45:31.916306 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1654578760" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1654578760" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1654578760" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1654578760" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 21:45:31.916306 ignition[1058]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 21:45:32.567493 kernel: audit: type=1130 audit(1712958331.996:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.567542 kernel: audit: type=1130 audit(1712958332.065:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.567565 kernel: audit: type=1131 audit(1712958332.065:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.567586 kernel: audit: type=1130 audit(1712958332.244:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.567606 kernel: audit: type=1131 audit(1712958332.244:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.567627 kernel: audit: type=1130 audit(1712958332.423:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.833907 systemd[1]: Finished ignition-files.service. Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1d): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1d): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 21:45:32.581688 ignition[1058]: INFO : files: files passed Apr 12 21:45:32.581688 ignition[1058]: INFO : POST message to Packet Timeline Apr 12 21:45:32.581688 ignition[1058]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:45:32.581688 ignition[1058]: INFO : GET result: OK Apr 12 21:45:32.581688 ignition[1058]: INFO : Ignition finished successfully Apr 12 21:45:33.192503 kernel: audit: type=1131 audit(1712958332.589:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.192592 kernel: audit: type=1131 audit(1712958332.905:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.192640 kernel: audit: type=1131 audit(1712958333.001:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.864108 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 21:45:33.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.924489 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 21:45:33.234448 initrd-setup-root-after-ignition[1091]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 21:45:31.924900 systemd[1]: Starting ignition-quench.service... Apr 12 21:45:33.270497 iscsid[908]: iscsid shutting down. Apr 12 21:45:33.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.969733 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 21:45:33.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.997860 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 21:45:33.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:31.997987 systemd[1]: Finished ignition-quench.service. Apr 12 21:45:33.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.065526 systemd[1]: Reached target ignition-complete.target. Apr 12 21:45:32.187948 systemd[1]: Starting initrd-parse-etc.service... Apr 12 21:45:32.231088 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 21:45:33.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.379671 ignition[1106]: INFO : Ignition 2.14.0 Apr 12 21:45:33.379671 ignition[1106]: INFO : Stage: umount Apr 12 21:45:33.379671 ignition[1106]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:45:33.379671 ignition[1106]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:45:33.379671 ignition[1106]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:45:33.379671 ignition[1106]: INFO : umount: umount passed Apr 12 21:45:33.379671 ignition[1106]: INFO : POST message to Packet Timeline Apr 12 21:45:33.379671 ignition[1106]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:45:33.379671 ignition[1106]: INFO : GET result: OK Apr 12 21:45:33.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.231147 systemd[1]: Finished initrd-parse-etc.service. Apr 12 21:45:33.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.531530 ignition[1106]: INFO : Ignition finished successfully Apr 12 21:45:33.547000 audit: BPF prog-id=6 op=UNLOAD Apr 12 21:45:32.245570 systemd[1]: Reached target initrd-fs.target. Apr 12 21:45:33.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.369460 systemd[1]: Reached target initrd.target. Apr 12 21:45:33.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.369594 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 21:45:33.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.369957 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 21:45:33.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.405702 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 21:45:32.425267 systemd[1]: Starting initrd-cleanup.service... Apr 12 21:45:33.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.494444 systemd[1]: Stopped target nss-lookup.target. Apr 12 21:45:33.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.524611 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 21:45:33.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.550620 systemd[1]: Stopped target timers.target. Apr 12 21:45:32.574750 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 21:45:32.574996 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 21:45:33.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.591206 systemd[1]: Stopped target initrd.target. Apr 12 21:45:32.666620 systemd[1]: Stopped target basic.target. Apr 12 21:45:32.678687 systemd[1]: Stopped target ignition-complete.target. Apr 12 21:45:33.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.702647 systemd[1]: Stopped target ignition-diskful.target. Apr 12 21:45:33.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.736662 systemd[1]: Stopped target initrd-root-device.target. Apr 12 21:45:33.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.756920 systemd[1]: Stopped target remote-fs.target. Apr 12 21:45:33.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.777925 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 21:45:33.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.798955 systemd[1]: Stopped target sysinit.target. Apr 12 21:45:33.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.820939 systemd[1]: Stopped target local-fs.target. Apr 12 21:45:33.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:32.842918 systemd[1]: Stopped target local-fs-pre.target. Apr 12 21:45:32.863927 systemd[1]: Stopped target swap.target. Apr 12 21:45:32.883814 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 21:45:32.884176 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 21:45:32.907158 systemd[1]: Stopped target cryptsetup.target. Apr 12 21:45:32.987606 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 21:45:32.987686 systemd[1]: Stopped dracut-initqueue.service. Apr 12 21:45:33.001741 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 21:45:33.001815 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 21:45:33.070676 systemd[1]: Stopped target paths.target. Apr 12 21:45:33.087671 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 21:45:33.091480 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 21:45:33.110661 systemd[1]: Stopped target slices.target. Apr 12 21:45:33.133620 systemd[1]: Stopped target sockets.target. Apr 12 21:45:33.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:33.149688 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 21:45:33.149867 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 21:45:33.170004 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 21:45:33.170366 systemd[1]: Stopped ignition-files.service. Apr 12 21:45:33.185025 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 21:45:33.185411 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 21:45:33.203288 systemd[1]: Stopping ignition-mount.service... Apr 12 21:45:33.217459 systemd[1]: Stopping iscsid.service... Apr 12 21:45:33.241996 systemd[1]: Stopping sysroot-boot.service... Apr 12 21:45:33.263454 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 21:45:33.263711 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 21:45:33.279012 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 21:45:33.279413 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 21:45:33.299099 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 21:45:33.299445 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 21:45:33.299492 systemd[1]: Stopped iscsid.service. Apr 12 21:45:33.308675 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 21:45:34.055236 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Apr 12 21:45:33.308717 systemd[1]: Stopped sysroot-boot.service. Apr 12 21:45:33.324818 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 21:45:33.324886 systemd[1]: Closed iscsid.socket. Apr 12 21:45:33.339598 systemd[1]: Stopping iscsiuio.service... Apr 12 21:45:33.357031 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 21:45:33.357199 systemd[1]: Stopped iscsiuio.service. Apr 12 21:45:33.372417 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 21:45:33.372646 systemd[1]: Finished initrd-cleanup.service. Apr 12 21:45:33.389711 systemd[1]: Stopped target network.target. Apr 12 21:45:33.403609 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 21:45:33.403711 systemd[1]: Closed iscsiuio.socket. Apr 12 21:45:33.417858 systemd[1]: Stopping systemd-networkd.service... Apr 12 21:45:33.426390 systemd-networkd[879]: enp1s0f1np1: DHCPv6 lease lost Apr 12 21:45:33.435709 systemd[1]: Stopping systemd-resolved.service... Apr 12 21:45:33.438464 systemd-networkd[879]: enp1s0f0np0: DHCPv6 lease lost Apr 12 21:45:34.054000 audit: BPF prog-id=9 op=UNLOAD Apr 12 21:45:33.455168 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 21:45:33.455435 systemd[1]: Stopped systemd-resolved.service. Apr 12 21:45:33.480809 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 21:45:33.481117 systemd[1]: Stopped systemd-networkd.service. Apr 12 21:45:33.501554 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 21:45:33.501604 systemd[1]: Stopped ignition-mount.service. Apr 12 21:45:33.524504 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 21:45:33.524528 systemd[1]: Closed systemd-networkd.socket. Apr 12 21:45:33.539447 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 21:45:33.539505 systemd[1]: Stopped ignition-disks.service. Apr 12 21:45:33.556524 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 21:45:33.556620 systemd[1]: Stopped ignition-kargs.service. Apr 12 21:45:33.571580 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 21:45:33.571710 systemd[1]: Stopped ignition-setup.service. Apr 12 21:45:33.587664 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 21:45:33.587815 systemd[1]: Stopped initrd-setup-root.service. Apr 12 21:45:33.608369 systemd[1]: Stopping network-cleanup.service... Apr 12 21:45:33.622437 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 21:45:33.622615 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 21:45:33.637698 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 21:45:33.637858 systemd[1]: Stopped systemd-sysctl.service. Apr 12 21:45:33.652985 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 21:45:33.653131 systemd[1]: Stopped systemd-modules-load.service. Apr 12 21:45:33.668883 systemd[1]: Stopping systemd-udevd.service... Apr 12 21:45:33.687306 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 21:45:33.688630 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 21:45:33.688689 systemd[1]: Stopped systemd-udevd.service. Apr 12 21:45:33.707835 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 21:45:33.707870 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 21:45:33.722426 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 21:45:33.722460 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 21:45:33.737410 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 21:45:33.737484 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 21:45:33.752649 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 21:45:33.752786 systemd[1]: Stopped dracut-cmdline.service. Apr 12 21:45:33.768567 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 21:45:33.768700 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 21:45:33.786530 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 21:45:33.800316 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 21:45:33.800345 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 21:45:33.800436 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 21:45:33.800456 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 21:45:33.822389 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 21:45:33.822423 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 21:45:33.839370 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 21:45:33.839873 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 21:45:33.839958 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 21:45:33.962471 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 21:45:33.962704 systemd[1]: Stopped network-cleanup.service. Apr 12 21:45:33.971872 systemd[1]: Reached target initrd-switch-root.target. Apr 12 21:45:33.988163 systemd[1]: Starting initrd-switch-root.service... Apr 12 21:45:34.012067 systemd[1]: Switching root. Apr 12 21:45:34.056623 systemd-journald[267]: Journal stopped Apr 12 21:45:37.910979 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 21:45:37.910994 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 21:45:37.911003 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 21:45:37.911009 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 21:45:37.911014 kernel: SELinux: policy capability open_perms=1 Apr 12 21:45:37.911019 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 21:45:37.911026 kernel: SELinux: policy capability always_check_network=0 Apr 12 21:45:37.911031 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 21:45:37.911036 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 21:45:37.911043 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 21:45:37.911049 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 21:45:37.911055 systemd[1]: Successfully loaded SELinux policy in 296.518ms. Apr 12 21:45:37.911062 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.307ms. Apr 12 21:45:37.911069 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:45:37.911077 systemd[1]: Detected architecture x86-64. Apr 12 21:45:37.911104 systemd[1]: Detected first boot. Apr 12 21:45:37.911110 systemd[1]: Hostname set to . Apr 12 21:45:37.911117 systemd[1]: Initializing machine ID from random generator. Apr 12 21:45:37.911123 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 21:45:37.911129 systemd[1]: Populated /etc with preset unit settings. Apr 12 21:45:37.911152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:45:37.911180 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:45:37.911193 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:45:37.911204 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 21:45:37.911214 systemd[1]: Stopped initrd-switch-root.service. Apr 12 21:45:37.911225 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 21:45:37.911252 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 21:45:37.911275 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 21:45:37.911282 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 21:45:37.911288 systemd[1]: Created slice system-getty.slice. Apr 12 21:45:37.911295 systemd[1]: Created slice system-modprobe.slice. Apr 12 21:45:37.911301 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 21:45:37.911307 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 21:45:37.911314 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 21:45:37.911320 systemd[1]: Created slice user.slice. Apr 12 21:45:37.911339 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:45:37.911351 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 21:45:37.911362 systemd[1]: Set up automount boot.automount. Apr 12 21:45:37.911392 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 21:45:37.911420 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 21:45:37.911434 systemd[1]: Stopped target initrd-fs.target. Apr 12 21:45:37.911445 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 21:45:37.911454 systemd[1]: Reached target integritysetup.target. Apr 12 21:45:37.911495 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:45:37.911503 systemd[1]: Reached target remote-fs.target. Apr 12 21:45:37.911509 systemd[1]: Reached target slices.target. Apr 12 21:45:37.911516 systemd[1]: Reached target swap.target. Apr 12 21:45:37.911522 systemd[1]: Reached target torcx.target. Apr 12 21:45:37.911529 systemd[1]: Reached target veritysetup.target. Apr 12 21:45:37.911535 systemd[1]: Listening on systemd-coredump.socket. Apr 12 21:45:37.911542 systemd[1]: Listening on systemd-initctl.socket. Apr 12 21:45:37.911548 systemd[1]: Listening on systemd-networkd.socket. Apr 12 21:45:37.911557 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:45:37.911563 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:45:37.911570 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 21:45:37.911577 systemd[1]: Mounting dev-hugepages.mount... Apr 12 21:45:37.911583 systemd[1]: Mounting dev-mqueue.mount... Apr 12 21:45:37.911590 systemd[1]: Mounting media.mount... Apr 12 21:45:37.911597 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 21:45:37.911604 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 21:45:37.911611 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 21:45:37.911617 systemd[1]: Mounting tmp.mount... Apr 12 21:45:37.911624 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 21:45:37.911631 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 21:45:37.911638 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:45:37.911653 systemd[1]: Starting modprobe@configfs.service... Apr 12 21:45:37.911660 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 21:45:37.911667 systemd[1]: Starting modprobe@drm.service... Apr 12 21:45:37.911674 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 21:45:37.911681 systemd[1]: Starting modprobe@fuse.service... Apr 12 21:45:37.911687 kernel: fuse: init (API version 7.34) Apr 12 21:45:37.911694 systemd[1]: Starting modprobe@loop.service... Apr 12 21:45:37.911700 kernel: loop: module loaded Apr 12 21:45:37.911707 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 21:45:37.911714 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 21:45:37.911721 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 21:45:37.911728 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 21:45:37.911734 kernel: kauditd_printk_skb: 72 callbacks suppressed Apr 12 21:45:37.911741 kernel: audit: type=1131 audit(1712958337.553:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.911747 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 21:45:37.911753 kernel: audit: type=1131 audit(1712958337.641:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.911759 systemd[1]: Stopped systemd-journald.service. Apr 12 21:45:37.911766 kernel: audit: type=1130 audit(1712958337.705:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.911773 kernel: audit: type=1131 audit(1712958337.705:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.911779 kernel: audit: type=1334 audit(1712958337.789:119): prog-id=21 op=LOAD Apr 12 21:45:37.911785 kernel: audit: type=1334 audit(1712958337.807:120): prog-id=22 op=LOAD Apr 12 21:45:37.911791 kernel: audit: type=1334 audit(1712958337.826:121): prog-id=23 op=LOAD Apr 12 21:45:37.911797 kernel: audit: type=1334 audit(1712958337.844:122): prog-id=19 op=UNLOAD Apr 12 21:45:37.911815 systemd[1]: Starting systemd-journald.service... Apr 12 21:45:37.911822 kernel: audit: type=1334 audit(1712958337.844:123): prog-id=20 op=UNLOAD Apr 12 21:45:37.911828 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:45:37.911835 kernel: audit: type=1305 audit(1712958337.907:124): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 21:45:37.911844 systemd-journald[1255]: Journal started Apr 12 21:45:37.911869 systemd-journald[1255]: Runtime Journal (/run/log/journal/7ef366d3a0ec42c3a03a2d8e3a604251) is 8.0M, max 640.1M, 632.1M free. Apr 12 21:45:34.406000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 21:45:34.675000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:45:34.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:45:34.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:45:34.678000 audit: BPF prog-id=10 op=LOAD Apr 12 21:45:34.678000 audit: BPF prog-id=10 op=UNLOAD Apr 12 21:45:34.678000 audit: BPF prog-id=11 op=LOAD Apr 12 21:45:34.678000 audit: BPF prog-id=11 op=UNLOAD Apr 12 21:45:34.745000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 21:45:34.745000 audit[1145]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001278e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:34.745000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:45:34.770000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 21:45:34.770000 audit[1145]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001279b9 a2=1ed a3=0 items=2 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:34.770000 audit: CWD cwd="/" Apr 12 21:45:34.770000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:34.770000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:34.770000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:45:36.293000 audit: BPF prog-id=12 op=LOAD Apr 12 21:45:36.293000 audit: BPF prog-id=3 op=UNLOAD Apr 12 21:45:36.293000 audit: BPF prog-id=13 op=LOAD Apr 12 21:45:36.294000 audit: BPF prog-id=14 op=LOAD Apr 12 21:45:36.294000 audit: BPF prog-id=4 op=UNLOAD Apr 12 21:45:36.294000 audit: BPF prog-id=5 op=UNLOAD Apr 12 21:45:36.294000 audit: BPF prog-id=15 op=LOAD Apr 12 21:45:36.294000 audit: BPF prog-id=12 op=UNLOAD Apr 12 21:45:36.294000 audit: BPF prog-id=16 op=LOAD Apr 12 21:45:36.295000 audit: BPF prog-id=17 op=LOAD Apr 12 21:45:36.295000 audit: BPF prog-id=13 op=UNLOAD Apr 12 21:45:36.295000 audit: BPF prog-id=14 op=UNLOAD Apr 12 21:45:36.295000 audit: BPF prog-id=18 op=LOAD Apr 12 21:45:36.295000 audit: BPF prog-id=15 op=UNLOAD Apr 12 21:45:36.295000 audit: BPF prog-id=19 op=LOAD Apr 12 21:45:36.295000 audit: BPF prog-id=20 op=LOAD Apr 12 21:45:36.295000 audit: BPF prog-id=16 op=UNLOAD Apr 12 21:45:36.295000 audit: BPF prog-id=17 op=UNLOAD Apr 12 21:45:36.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:36.348000 audit: BPF prog-id=18 op=UNLOAD Apr 12 21:45:36.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:36.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:37.789000 audit: BPF prog-id=21 op=LOAD Apr 12 21:45:37.807000 audit: BPF prog-id=22 op=LOAD Apr 12 21:45:37.826000 audit: BPF prog-id=23 op=LOAD Apr 12 21:45:37.844000 audit: BPF prog-id=19 op=UNLOAD Apr 12 21:45:37.844000 audit: BPF prog-id=20 op=UNLOAD Apr 12 21:45:37.907000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 21:45:34.743638 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:45:36.293223 systemd[1]: Queued start job for default target multi-user.target. Apr 12 21:45:34.744093 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:45:36.296896 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 21:45:34.744106 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:45:34.744126 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 21:45:34.744132 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 21:45:34.744150 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 21:45:34.744158 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 21:45:34.744290 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 21:45:34.744314 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:45:34.744322 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:45:34.745689 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 21:45:34.745711 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 21:45:34.745723 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 21:45:34.745732 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 21:45:34.745743 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 21:45:34.745752 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 21:45:35.945133 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:45:35.945285 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:45:35.945347 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:45:35.945444 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:45:35.945475 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 21:45:35.945509 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-04-12T21:45:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 21:45:37.907000 audit[1255]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe0da3e7f0 a2=4000 a3=7ffe0da3e88c items=0 ppid=1 pid=1255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:37.907000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 21:45:37.988445 systemd[1]: Starting systemd-network-generator.service... Apr 12 21:45:38.015270 systemd[1]: Starting systemd-remount-fs.service... Apr 12 21:45:38.042279 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:45:38.085002 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 21:45:38.085024 systemd[1]: Stopped verity-setup.service. Apr 12 21:45:38.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.130274 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 21:45:38.150422 systemd[1]: Started systemd-journald.service. Apr 12 21:45:38.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.158790 systemd[1]: Mounted dev-hugepages.mount. Apr 12 21:45:38.166485 systemd[1]: Mounted dev-mqueue.mount. Apr 12 21:45:38.173499 systemd[1]: Mounted media.mount. Apr 12 21:45:38.180512 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 21:45:38.189483 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 21:45:38.198462 systemd[1]: Mounted tmp.mount. Apr 12 21:45:38.205558 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 21:45:38.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.214559 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:45:38.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.223636 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 21:45:38.223757 systemd[1]: Finished modprobe@configfs.service. Apr 12 21:45:38.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.232740 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 21:45:38.232897 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 21:45:38.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.241825 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 21:45:38.242019 systemd[1]: Finished modprobe@drm.service. Apr 12 21:45:38.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.251070 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 21:45:38.251421 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 21:45:38.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.260071 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 21:45:38.260421 systemd[1]: Finished modprobe@fuse.service. Apr 12 21:45:38.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.269051 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 21:45:38.269398 systemd[1]: Finished modprobe@loop.service. Apr 12 21:45:38.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.278079 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:45:38.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.287009 systemd[1]: Finished systemd-network-generator.service. Apr 12 21:45:38.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.296065 systemd[1]: Finished systemd-remount-fs.service. Apr 12 21:45:38.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.305027 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:45:38.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.314523 systemd[1]: Reached target network-pre.target. Apr 12 21:45:38.325086 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 21:45:38.333980 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 21:45:38.341461 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 21:45:38.342375 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 21:45:38.349884 systemd[1]: Starting systemd-journal-flush.service... Apr 12 21:45:38.353727 systemd-journald[1255]: Time spent on flushing to /var/log/journal/7ef366d3a0ec42c3a03a2d8e3a604251 is 18.336ms for 1629 entries. Apr 12 21:45:38.353727 systemd-journald[1255]: System Journal (/var/log/journal/7ef366d3a0ec42c3a03a2d8e3a604251) is 8.0M, max 195.6M, 187.6M free. Apr 12 21:45:38.402505 systemd-journald[1255]: Received client request to flush runtime journal. Apr 12 21:45:38.366333 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 21:45:38.366905 systemd[1]: Starting systemd-random-seed.service... Apr 12 21:45:38.381332 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 21:45:38.381930 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:45:38.388901 systemd[1]: Starting systemd-sysusers.service... Apr 12 21:45:38.395846 systemd[1]: Starting systemd-udev-settle.service... Apr 12 21:45:38.403454 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 21:45:38.411374 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 21:45:38.419475 systemd[1]: Finished systemd-journal-flush.service. Apr 12 21:45:38.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.427467 systemd[1]: Finished systemd-random-seed.service. Apr 12 21:45:38.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.435464 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:45:38.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.443424 systemd[1]: Finished systemd-sysusers.service. Apr 12 21:45:38.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.452452 systemd[1]: Reached target first-boot-complete.target. Apr 12 21:45:38.460984 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 21:45:38.470423 udevadm[1272]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 21:45:38.477590 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 21:45:38.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.659514 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 21:45:38.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.668000 audit: BPF prog-id=24 op=LOAD Apr 12 21:45:38.668000 audit: BPF prog-id=25 op=LOAD Apr 12 21:45:38.668000 audit: BPF prog-id=7 op=UNLOAD Apr 12 21:45:38.668000 audit: BPF prog-id=8 op=UNLOAD Apr 12 21:45:38.669601 systemd[1]: Starting systemd-udevd.service... Apr 12 21:45:38.681279 systemd-udevd[1275]: Using default interface naming scheme 'v252'. Apr 12 21:45:38.697984 systemd[1]: Started systemd-udevd.service. Apr 12 21:45:38.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.708658 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 21:45:38.708000 audit: BPF prog-id=26 op=LOAD Apr 12 21:45:38.709902 systemd[1]: Starting systemd-networkd.service... Apr 12 21:45:38.731000 audit: BPF prog-id=27 op=LOAD Apr 12 21:45:38.731000 audit: BPF prog-id=28 op=LOAD Apr 12 21:45:38.731000 audit: BPF prog-id=29 op=LOAD Apr 12 21:45:38.733236 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 21:45:38.734999 systemd[1]: Starting systemd-userdbd.service... Apr 12 21:45:38.736232 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 21:45:38.736268 kernel: IPMI message handler: version 39.2 Apr 12 21:45:38.736283 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 21:45:38.744234 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1281) Apr 12 21:45:38.770281 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 21:45:38.741000 audit[1285]: AVC avc: denied { confidentiality } for pid=1285 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:45:38.741000 audit[1285]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563fbfb10f80 a1=4d8bc a2=7f7020bcebc5 a3=5 items=42 ppid=1275 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:38.741000 audit: CWD cwd="/" Apr 12 21:45:38.741000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=1 name=(null) inode=26182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=2 name=(null) inode=26182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=3 name=(null) inode=26183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=4 name=(null) inode=26182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=5 name=(null) inode=26184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=6 name=(null) inode=26182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=7 name=(null) inode=26185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=8 name=(null) inode=26185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=9 name=(null) inode=26186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=10 name=(null) inode=26185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=11 name=(null) inode=26187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=12 name=(null) inode=26185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=13 name=(null) inode=26188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=14 name=(null) inode=26185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=15 name=(null) inode=26189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=16 name=(null) inode=26185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=17 name=(null) inode=26190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=18 name=(null) inode=26182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=19 name=(null) inode=26191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=20 name=(null) inode=26191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=21 name=(null) inode=26192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=22 name=(null) inode=26191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=23 name=(null) inode=26193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=24 name=(null) inode=26191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=25 name=(null) inode=26194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=26 name=(null) inode=26191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=27 name=(null) inode=26195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=28 name=(null) inode=26191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=29 name=(null) inode=26196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=30 name=(null) inode=26182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=31 name=(null) inode=26197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=32 name=(null) inode=26197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=33 name=(null) inode=26198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=34 name=(null) inode=26197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=35 name=(null) inode=26199 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=36 name=(null) inode=26197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=37 name=(null) inode=26200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=38 name=(null) inode=26197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=39 name=(null) inode=26201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=40 name=(null) inode=26197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PATH item=41 name=(null) inode=26202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:45:38.741000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 21:45:38.852904 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:45:38.855241 kernel: ipmi device interface Apr 12 21:45:38.879242 kernel: ACPI: button: Power Button [PWRF] Apr 12 21:45:38.901237 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 21:45:38.901391 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 21:45:38.930624 systemd[1]: Started systemd-userdbd.service. Apr 12 21:45:38.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:38.961287 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 21:45:38.961527 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 21:45:39.003235 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 21:45:39.058708 kernel: ipmi_si: IPMI System Interface driver Apr 12 21:45:39.058744 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 21:45:39.058837 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 21:45:39.098518 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 21:45:39.098569 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 21:45:39.098704 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 21:45:39.136111 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 21:45:39.180984 systemd-networkd[1320]: bond0: netdev ready Apr 12 21:45:39.189822 systemd-networkd[1320]: lo: Link UP Apr 12 21:45:39.189834 systemd-networkd[1320]: lo: Gained carrier Apr 12 21:45:39.190925 systemd-networkd[1320]: Enumeration completed Apr 12 21:45:39.191011 systemd[1]: Started systemd-networkd.service. Apr 12 21:45:39.191769 systemd-networkd[1320]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 21:45:39.192705 systemd-networkd[1320]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:42:d7:45.network. Apr 12 21:45:39.205674 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 21:45:39.205783 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 21:45:39.205809 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 21:45:39.205824 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Apr 12 21:45:39.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:39.285117 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 21:45:39.285216 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Apr 12 21:45:39.305292 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Apr 12 21:45:39.348234 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 21:45:39.348354 kernel: intel_rapl_common: Found RAPL domain package Apr 12 21:45:39.385301 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Apr 12 21:45:39.385326 kernel: intel_rapl_common: Found RAPL domain core Apr 12 21:45:39.385531 systemd-networkd[1320]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:42:d7:44.network. Apr 12 21:45:39.403278 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:45:39.403316 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 21:45:39.424233 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 21:45:39.481233 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 21:45:39.549234 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:45:39.757275 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Apr 12 21:45:39.782232 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Apr 12 21:45:39.782258 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 21:45:39.802305 systemd-networkd[1320]: bond0: Link UP Apr 12 21:45:39.802514 systemd-networkd[1320]: enp1s0f1np1: Link UP Apr 12 21:45:39.802657 systemd-networkd[1320]: enp1s0f1np1: Gained carrier Apr 12 21:45:39.803612 systemd-networkd[1320]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:42:d7:44.network. Apr 12 21:45:39.841366 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 21:45:39.841433 kernel: bond0: active interface up! Apr 12 21:45:39.864233 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 21:45:39.877485 systemd[1]: Finished systemd-udev-settle.service. Apr 12 21:45:39.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:39.885968 systemd[1]: Starting lvm2-activation-early.service... Apr 12 21:45:39.902119 lvm[1379]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 21:45:39.934680 systemd[1]: Finished lvm2-activation-early.service. Apr 12 21:45:39.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:39.943358 systemd[1]: Reached target cryptsetup.target. Apr 12 21:45:39.951877 systemd[1]: Starting lvm2-activation.service... Apr 12 21:45:39.953964 lvm[1380]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 21:45:39.990233 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.013233 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.036231 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.036666 systemd[1]: Finished lvm2-activation.service. Apr 12 21:45:40.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:40.053394 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:45:40.060231 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.077349 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 21:45:40.077364 systemd[1]: Reached target local-fs.target. Apr 12 21:45:40.083237 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.100329 systemd[1]: Reached target machines.target. Apr 12 21:45:40.106231 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.122931 systemd[1]: Starting ldconfig.service... Apr 12 21:45:40.128230 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.143767 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 21:45:40.143789 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:45:40.144441 systemd[1]: Starting systemd-boot-update.service... Apr 12 21:45:40.151270 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.166767 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 21:45:40.172234 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.172780 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 21:45:40.172855 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 21:45:40.172878 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 21:45:40.173368 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 21:45:40.173631 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1382 (bootctl) Apr 12 21:45:40.174202 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 21:45:40.194235 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.196052 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 21:45:40.199882 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 21:45:40.209022 systemd-tmpfiles[1386]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 21:45:40.215283 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.234885 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 21:45:40.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:40.235231 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.256232 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.275231 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.294230 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.313232 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.332232 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.351231 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.370259 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.388230 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.389339 systemd-networkd[1320]: enp1s0f0np0: Link UP Apr 12 21:45:40.389523 systemd-networkd[1320]: bond0: Gained carrier Apr 12 21:45:40.389620 systemd-networkd[1320]: enp1s0f0np0: Gained carrier Apr 12 21:45:40.420315 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:45:40.420357 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Apr 12 21:45:40.431501 systemd-networkd[1320]: enp1s0f1np1: Link DOWN Apr 12 21:45:40.431503 systemd-networkd[1320]: enp1s0f1np1: Lost carrier Apr 12 21:45:40.579236 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Apr 12 21:45:40.596231 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Apr 12 21:45:40.597087 systemd-networkd[1320]: enp1s0f1np1: Link UP Apr 12 21:45:40.597269 systemd-networkd[1320]: enp1s0f1np1: Gained carrier Apr 12 21:45:40.646231 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Apr 12 21:45:40.664230 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 21:45:40.727712 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 21:45:40.728067 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 21:45:40.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:40.757443 systemd-fsck[1391]: fsck.fat 4.2 (2021-01-31) Apr 12 21:45:40.757443 systemd-fsck[1391]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 21:45:40.758194 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 21:45:40.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:40.769162 systemd[1]: Mounting boot.mount... Apr 12 21:45:40.781155 systemd[1]: Mounted boot.mount. Apr 12 21:45:40.801507 systemd[1]: Finished systemd-boot-update.service. Apr 12 21:45:40.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:40.832815 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 21:45:40.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:40.842082 systemd[1]: Starting audit-rules.service... Apr 12 21:45:40.848891 systemd[1]: Starting clean-ca-certificates.service... Apr 12 21:45:40.857861 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 21:45:40.858000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 21:45:40.858000 audit[1411]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcae8df100 a2=420 a3=0 items=0 ppid=1394 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:40.858000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 21:45:40.860267 augenrules[1411]: No rules Apr 12 21:45:40.867232 systemd[1]: Starting systemd-resolved.service... Apr 12 21:45:40.875203 systemd[1]: Starting systemd-timesyncd.service... Apr 12 21:45:40.882799 systemd[1]: Starting systemd-update-utmp.service... Apr 12 21:45:40.889587 systemd[1]: Finished audit-rules.service. Apr 12 21:45:40.897469 systemd[1]: Finished clean-ca-certificates.service. Apr 12 21:45:40.905423 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 21:45:40.916561 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 21:45:40.917107 systemd[1]: Finished systemd-update-utmp.service. Apr 12 21:45:40.929529 ldconfig[1381]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 21:45:40.932182 systemd[1]: Finished ldconfig.service. Apr 12 21:45:40.939934 systemd[1]: Starting systemd-update-done.service... Apr 12 21:45:40.944843 systemd-resolved[1416]: Positive Trust Anchors: Apr 12 21:45:40.944851 systemd-resolved[1416]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 21:45:40.944884 systemd-resolved[1416]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 21:45:40.947416 systemd[1]: Started systemd-timesyncd.service. Apr 12 21:45:40.948826 systemd-resolved[1416]: Using system hostname 'ci-3510.3.3-a-26e8ad9098'. Apr 12 21:45:40.956352 systemd[1]: Started systemd-resolved.service. Apr 12 21:45:40.965376 systemd[1]: Finished systemd-update-done.service. Apr 12 21:45:40.974299 systemd[1]: Reached target network.target. Apr 12 21:45:40.983259 systemd[1]: Reached target nss-lookup.target. Apr 12 21:45:40.992263 systemd[1]: Reached target sysinit.target. Apr 12 21:45:41.001304 systemd[1]: Started motdgen.path. Apr 12 21:45:41.009480 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 21:45:41.019397 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 21:45:41.027262 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 21:45:41.027277 systemd[1]: Reached target paths.target. Apr 12 21:45:41.034259 systemd[1]: Reached target time-set.target. Apr 12 21:45:41.042332 systemd[1]: Started logrotate.timer. Apr 12 21:45:41.049296 systemd[1]: Started mdadm.timer. Apr 12 21:45:41.056259 systemd[1]: Reached target timers.target. Apr 12 21:45:41.063388 systemd[1]: Listening on dbus.socket. Apr 12 21:45:41.070750 systemd[1]: Starting docker.socket... Apr 12 21:45:41.083784 systemd[1]: Listening on sshd.socket. Apr 12 21:45:41.090788 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:45:41.092180 systemd[1]: Listening on docker.socket. Apr 12 21:45:41.099675 systemd[1]: Reached target sockets.target. Apr 12 21:45:41.108260 systemd[1]: Reached target basic.target. Apr 12 21:45:41.115280 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 21:45:41.115293 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 21:45:41.115732 systemd[1]: Starting containerd.service... Apr 12 21:45:41.122673 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 21:45:41.130740 systemd[1]: Starting coreos-metadata.service... Apr 12 21:45:41.137759 systemd[1]: Starting dbus.service... Apr 12 21:45:41.143847 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 21:45:41.148170 jq[1432]: false Apr 12 21:45:41.150804 systemd[1]: Starting extend-filesystems.service... Apr 12 21:45:41.151418 coreos-metadata[1425]: Apr 12 21:45:41.151 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:45:41.156432 dbus-daemon[1431]: [system] SELinux support is enabled Apr 12 21:45:41.157316 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 21:45:41.157926 systemd[1]: Starting motdgen.service... Apr 12 21:45:41.158448 extend-filesystems[1433]: Found sda Apr 12 21:45:41.158448 extend-filesystems[1433]: Found sda1 Apr 12 21:45:41.198370 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Apr 12 21:45:41.164918 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 21:45:41.198473 coreos-metadata[1428]: Apr 12 21:45:41.159 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:45:41.198577 extend-filesystems[1433]: Found sda2 Apr 12 21:45:41.198577 extend-filesystems[1433]: Found sda3 Apr 12 21:45:41.198577 extend-filesystems[1433]: Found usr Apr 12 21:45:41.198577 extend-filesystems[1433]: Found sda4 Apr 12 21:45:41.198577 extend-filesystems[1433]: Found sda6 Apr 12 21:45:41.198577 extend-filesystems[1433]: Found sda7 Apr 12 21:45:41.198577 extend-filesystems[1433]: Found sda9 Apr 12 21:45:41.198577 extend-filesystems[1433]: Checking size of /dev/sda9 Apr 12 21:45:41.198577 extend-filesystems[1433]: Resized partition /dev/sda9 Apr 12 21:45:41.192030 systemd[1]: Starting prepare-critools.service... Apr 12 21:45:41.302398 extend-filesystems[1449]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 21:45:41.206025 systemd[1]: Starting prepare-helm.service... Apr 12 21:45:41.219897 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 21:45:41.234939 systemd[1]: Starting sshd-keygen.service... Apr 12 21:45:41.254633 systemd[1]: Starting systemd-logind.service... Apr 12 21:45:41.260361 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:45:41.260862 systemd[1]: Starting tcsd.service... Apr 12 21:45:41.319734 jq[1465]: true Apr 12 21:45:41.275612 systemd-logind[1462]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 21:45:41.275623 systemd-logind[1462]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 21:45:41.275632 systemd-logind[1462]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 21:45:41.275740 systemd-logind[1462]: New seat seat0. Apr 12 21:45:41.282731 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 21:45:41.283082 systemd[1]: Starting update-engine.service... Apr 12 21:45:41.290817 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 21:45:41.310631 systemd[1]: Started dbus.service. Apr 12 21:45:41.328014 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 21:45:41.328110 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 21:45:41.328282 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 21:45:41.328361 systemd[1]: Finished motdgen.service. Apr 12 21:45:41.331183 update_engine[1464]: I0412 21:45:41.330642 1464 main.cc:92] Flatcar Update Engine starting Apr 12 21:45:41.334092 update_engine[1464]: I0412 21:45:41.334082 1464 update_check_scheduler.cc:74] Next update check in 11m52s Apr 12 21:45:41.336379 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 21:45:41.336462 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 21:45:41.340698 tar[1467]: ./ Apr 12 21:45:41.340698 tar[1467]: ./loopback Apr 12 21:45:41.348033 jq[1473]: true Apr 12 21:45:41.349104 dbus-daemon[1431]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 21:45:41.349863 tar[1468]: crictl Apr 12 21:45:41.351060 tar[1469]: linux-amd64/helm Apr 12 21:45:41.354100 systemd[1]: Started update-engine.service. Apr 12 21:45:41.359502 tar[1467]: ./bandwidth Apr 12 21:45:41.361354 env[1474]: time="2024-04-12T21:45:41.361300810Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 21:45:41.363492 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 21:45:41.363590 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 21:45:41.370131 env[1474]: time="2024-04-12T21:45:41.370086995Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 21:45:41.370466 systemd[1]: Started systemd-logind.service. Apr 12 21:45:41.377037 env[1474]: time="2024-04-12T21:45:41.376993042Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:45:41.377698 env[1474]: time="2024-04-12T21:45:41.377649417Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:45:41.377698 env[1474]: time="2024-04-12T21:45:41.377666017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:45:41.377822 env[1474]: time="2024-04-12T21:45:41.377776506Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:45:41.377822 env[1474]: time="2024-04-12T21:45:41.377787011Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 21:45:41.377822 env[1474]: time="2024-04-12T21:45:41.377793994Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 21:45:41.377822 env[1474]: time="2024-04-12T21:45:41.377799180Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 21:45:41.382783 env[1474]: time="2024-04-12T21:45:41.382746678Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:45:41.381663 systemd[1]: Started locksmithd.service. Apr 12 21:45:41.382901 env[1474]: time="2024-04-12T21:45:41.382893986Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:45:41.382988 env[1474]: time="2024-04-12T21:45:41.382974389Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:45:41.382988 env[1474]: time="2024-04-12T21:45:41.382987026Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 21:45:41.383033 env[1474]: time="2024-04-12T21:45:41.383013541Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 21:45:41.383033 env[1474]: time="2024-04-12T21:45:41.383021170Z" level=info msg="metadata content store policy set" policy=shared Apr 12 21:45:41.389388 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 21:45:41.389533 systemd[1]: Reached target system-config.target. Apr 12 21:45:41.394169 bash[1497]: Updated "/home/core/.ssh/authorized_keys" Apr 12 21:45:41.397373 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 21:45:41.397448 systemd[1]: Reached target user-config.target. Apr 12 21:45:41.407911 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 21:45:41.408281 systemd-networkd[1320]: bond0: Gained IPv6LL Apr 12 21:45:41.418706 env[1474]: time="2024-04-12T21:45:41.418658446Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 21:45:41.418706 env[1474]: time="2024-04-12T21:45:41.418682803Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 21:45:41.418706 env[1474]: time="2024-04-12T21:45:41.418690742Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418710883Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418719870Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418727561Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418734114Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418741560Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418748629Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418756289Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418762980Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.418778 env[1474]: time="2024-04-12T21:45:41.418769748Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 21:45:41.418917 env[1474]: time="2024-04-12T21:45:41.418835453Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 21:45:41.418917 env[1474]: time="2024-04-12T21:45:41.418886785Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 21:45:41.419064 env[1474]: time="2024-04-12T21:45:41.419031815Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 21:45:41.419064 env[1474]: time="2024-04-12T21:45:41.419047125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419064 env[1474]: time="2024-04-12T21:45:41.419055440Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 21:45:41.419115 env[1474]: time="2024-04-12T21:45:41.419082538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419115 env[1474]: time="2024-04-12T21:45:41.419090295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419115 env[1474]: time="2024-04-12T21:45:41.419096905Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419115 env[1474]: time="2024-04-12T21:45:41.419102850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419115 env[1474]: time="2024-04-12T21:45:41.419109670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419191 env[1474]: time="2024-04-12T21:45:41.419116844Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419191 env[1474]: time="2024-04-12T21:45:41.419123184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419191 env[1474]: time="2024-04-12T21:45:41.419129379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419191 env[1474]: time="2024-04-12T21:45:41.419136571Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419197862Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419206756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419213212Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419219632Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419232776Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419240696Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 21:45:41.419262 env[1474]: time="2024-04-12T21:45:41.419250695Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 21:45:41.419365 env[1474]: time="2024-04-12T21:45:41.419271918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 21:45:41.419407 env[1474]: time="2024-04-12T21:45:41.419382040Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.419542477Z" level=info msg="Connect containerd service" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.419569589Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420076335Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420159843Z" level=info msg="Start subscribing containerd event" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420188976Z" level=info msg="Start recovering state" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420196372Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420218080Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420222190Z" level=info msg="Start event monitor" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420245961Z" level=info msg="Start snapshots syncer" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420253570Z" level=info msg="Start cni network conf syncer for default" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420252188Z" level=info msg="containerd successfully booted in 0.059856s" Apr 12 21:45:41.421542 env[1474]: time="2024-04-12T21:45:41.420258004Z" level=info msg="Start streaming server" Apr 12 21:45:41.420288 systemd[1]: Started containerd.service. Apr 12 21:45:41.422173 tar[1467]: ./ptp Apr 12 21:45:41.446441 tar[1467]: ./vlan Apr 12 21:45:41.447441 locksmithd[1507]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 21:45:41.468501 tar[1467]: ./host-device Apr 12 21:45:41.489939 tar[1467]: ./tuning Apr 12 21:45:41.508951 tar[1467]: ./vrf Apr 12 21:45:41.528804 tar[1467]: ./sbr Apr 12 21:45:41.548253 tar[1467]: ./tap Apr 12 21:45:41.570503 tar[1467]: ./dhcp Apr 12 21:45:41.594965 sshd_keygen[1461]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 21:45:41.606546 systemd[1]: Finished sshd-keygen.service. Apr 12 21:45:41.614176 systemd[1]: Starting issuegen.service... Apr 12 21:45:41.621508 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 21:45:41.621596 systemd[1]: Finished issuegen.service. Apr 12 21:45:41.627002 tar[1467]: ./static Apr 12 21:45:41.629175 systemd[1]: Starting systemd-user-sessions.service... Apr 12 21:45:41.637518 systemd[1]: Finished systemd-user-sessions.service. Apr 12 21:45:41.642980 tar[1467]: ./firewall Apr 12 21:45:41.644224 tar[1469]: linux-amd64/LICENSE Apr 12 21:45:41.644264 tar[1469]: linux-amd64/README.md Apr 12 21:45:41.647093 systemd[1]: Started getty@tty1.service. Apr 12 21:45:41.654918 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 21:45:41.663356 systemd[1]: Reached target getty.target. Apr 12 21:45:41.667531 tar[1467]: ./macvlan Apr 12 21:45:41.670550 systemd[1]: Finished prepare-helm.service. Apr 12 21:45:41.679450 systemd[1]: Finished prepare-critools.service. Apr 12 21:45:41.689650 tar[1467]: ./dummy Apr 12 21:45:41.711498 tar[1467]: ./bridge Apr 12 21:45:41.735518 tar[1467]: ./ipvlan Apr 12 21:45:41.757594 tar[1467]: ./portmap Apr 12 21:45:41.778347 tar[1467]: ./host-local Apr 12 21:45:41.802180 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 21:45:42.299282 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Apr 12 21:45:42.330684 extend-filesystems[1449]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 21:45:42.330684 extend-filesystems[1449]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 21:45:42.330684 extend-filesystems[1449]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Apr 12 21:45:42.367335 extend-filesystems[1433]: Resized filesystem in /dev/sda9 Apr 12 21:45:42.367335 extend-filesystems[1433]: Found sdb Apr 12 21:45:42.331158 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 21:45:42.331250 systemd[1]: Finished extend-filesystems.service. Apr 12 21:45:42.754469 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 21:45:46.713356 login[1534]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 21:45:46.713826 login[1533]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 21:45:46.721437 systemd-logind[1462]: New session 2 of user core. Apr 12 21:45:46.722003 systemd[1]: Created slice user-500.slice. Apr 12 21:45:46.722600 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 21:45:46.728706 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 21:45:46.729569 systemd[1]: Starting user@500.service... Apr 12 21:45:46.731766 (systemd)[1541]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:46.821001 systemd[1541]: Queued start job for default target default.target. Apr 12 21:45:46.821710 systemd[1541]: Reached target paths.target. Apr 12 21:45:46.821745 systemd[1541]: Reached target sockets.target. Apr 12 21:45:46.821770 systemd[1541]: Reached target timers.target. Apr 12 21:45:46.821791 systemd[1541]: Reached target basic.target. Apr 12 21:45:46.821847 systemd[1541]: Reached target default.target. Apr 12 21:45:46.821889 systemd[1541]: Startup finished in 86ms. Apr 12 21:45:46.821960 systemd[1]: Started user@500.service. Apr 12 21:45:46.823422 systemd[1]: Started session-2.scope. Apr 12 21:45:47.104600 coreos-metadata[1428]: Apr 12 21:45:47.104 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 21:45:47.105744 coreos-metadata[1425]: Apr 12 21:45:47.104 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 21:45:47.717201 login[1534]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 21:45:47.719993 systemd-logind[1462]: New session 1 of user core. Apr 12 21:45:47.720536 systemd[1]: Started session-1.scope. Apr 12 21:45:48.105131 coreos-metadata[1425]: Apr 12 21:45:48.104 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 21:45:48.105395 coreos-metadata[1428]: Apr 12 21:45:48.104 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 21:45:48.136018 systemd[1]: Created slice system-sshd.slice. Apr 12 21:45:48.136730 systemd[1]: Started sshd@0-145.40.90.149:22-147.75.109.163:60606.service. Apr 12 21:45:48.155818 coreos-metadata[1425]: Apr 12 21:45:48.155 INFO Fetch successful Apr 12 21:45:48.157286 coreos-metadata[1428]: Apr 12 21:45:48.157 INFO Fetch successful Apr 12 21:45:48.180020 unknown[1425]: wrote ssh authorized keys file for user: core Apr 12 21:45:48.180559 systemd[1]: Finished coreos-metadata.service. Apr 12 21:45:48.181374 systemd[1]: Started packet-phone-home.service. Apr 12 21:45:48.186738 sshd[1562]: Accepted publickey for core from 147.75.109.163 port 60606 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:48.187426 sshd[1562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:48.189449 curl[1566]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 21:45:48.189544 curl[1566]: Dload Upload Total Spent Left Speed Apr 12 21:45:48.189620 systemd-logind[1462]: New session 3 of user core. Apr 12 21:45:48.190107 systemd[1]: Started session-3.scope. Apr 12 21:45:48.193516 update-ssh-keys[1567]: Updated "/home/core/.ssh/authorized_keys" Apr 12 21:45:48.193768 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 21:45:48.193928 systemd[1]: Reached target multi-user.target. Apr 12 21:45:48.194614 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 21:45:48.198633 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 21:45:48.198708 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 21:45:48.198793 systemd[1]: Startup finished in 1.849s (kernel) + 21.270s (initrd) + 14.099s (userspace) = 37.219s. Apr 12 21:45:48.238393 systemd[1]: Started sshd@1-145.40.90.149:22-147.75.109.163:60616.service. Apr 12 21:45:48.276931 sshd[1573]: Accepted publickey for core from 147.75.109.163 port 60616 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:48.277627 sshd[1573]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:48.279916 systemd-logind[1462]: New session 4 of user core. Apr 12 21:45:48.280653 systemd[1]: Started session-4.scope. Apr 12 21:45:48.331397 sshd[1573]: pam_unix(sshd:session): session closed for user core Apr 12 21:45:48.333615 systemd[1]: sshd@1-145.40.90.149:22-147.75.109.163:60616.service: Deactivated successfully. Apr 12 21:45:48.334146 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 21:45:48.334670 systemd-logind[1462]: Session 4 logged out. Waiting for processes to exit. Apr 12 21:45:48.335357 systemd[1]: Started sshd@2-145.40.90.149:22-147.75.109.163:60628.service. Apr 12 21:45:48.335985 systemd-logind[1462]: Removed session 4. Apr 12 21:45:48.375373 sshd[1579]: Accepted publickey for core from 147.75.109.163 port 60628 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:48.376463 sshd[1579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:48.380175 systemd-logind[1462]: New session 5 of user core. Apr 12 21:45:48.381540 systemd[1]: Started session-5.scope. Apr 12 21:45:48.437629 sshd[1579]: pam_unix(sshd:session): session closed for user core Apr 12 21:45:48.439499 systemd[1]: sshd@2-145.40.90.149:22-147.75.109.163:60628.service: Deactivated successfully. Apr 12 21:45:48.439890 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 21:45:48.440249 systemd-logind[1462]: Session 5 logged out. Waiting for processes to exit. Apr 12 21:45:48.440818 systemd[1]: Started sshd@3-145.40.90.149:22-147.75.109.163:60634.service. Apr 12 21:45:48.441306 systemd-logind[1462]: Removed session 5. Apr 12 21:45:48.462093 systemd-timesyncd[1417]: Contacted time server 168.61.215.74:123 (0.flatcar.pool.ntp.org). Apr 12 21:45:48.462127 systemd-timesyncd[1417]: Initial clock synchronization to Fri 2024-04-12 21:45:48.495893 UTC. Apr 12 21:45:48.479725 sshd[1586]: Accepted publickey for core from 147.75.109.163 port 60634 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:48.481009 sshd[1586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:48.485668 systemd-logind[1462]: New session 6 of user core. Apr 12 21:45:48.487389 systemd[1]: Started session-6.scope. Apr 12 21:45:48.491719 curl[1566]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 21:45:48.493195 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 21:45:48.561868 sshd[1586]: pam_unix(sshd:session): session closed for user core Apr 12 21:45:48.570424 systemd[1]: sshd@3-145.40.90.149:22-147.75.109.163:60634.service: Deactivated successfully. Apr 12 21:45:48.572610 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 21:45:48.574716 systemd-logind[1462]: Session 6 logged out. Waiting for processes to exit. Apr 12 21:45:48.577746 systemd[1]: Started sshd@4-145.40.90.149:22-147.75.109.163:60640.service. Apr 12 21:45:48.580570 systemd-logind[1462]: Removed session 6. Apr 12 21:45:48.655559 sshd[1592]: Accepted publickey for core from 147.75.109.163 port 60640 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:48.658778 sshd[1592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:48.669120 systemd-logind[1462]: New session 7 of user core. Apr 12 21:45:48.672939 systemd[1]: Started session-7.scope. Apr 12 21:45:48.774498 sudo[1595]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 21:45:48.775120 sudo[1595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:45:48.792683 dbus-daemon[1431]: \xd0\xed\xa4\xce2V: received setenforce notice (enforcing=-937231184) Apr 12 21:45:48.797610 sudo[1595]: pam_unix(sudo:session): session closed for user root Apr 12 21:45:48.802948 sshd[1592]: pam_unix(sshd:session): session closed for user core Apr 12 21:45:48.810134 systemd[1]: sshd@4-145.40.90.149:22-147.75.109.163:60640.service: Deactivated successfully. Apr 12 21:45:48.811885 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 21:45:48.813751 systemd-logind[1462]: Session 7 logged out. Waiting for processes to exit. Apr 12 21:45:48.816435 systemd[1]: Started sshd@5-145.40.90.149:22-147.75.109.163:60648.service. Apr 12 21:45:48.819017 systemd-logind[1462]: Removed session 7. Apr 12 21:45:48.887560 sshd[1599]: Accepted publickey for core from 147.75.109.163 port 60648 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:48.889886 sshd[1599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:48.897419 systemd-logind[1462]: New session 8 of user core. Apr 12 21:45:48.899177 systemd[1]: Started session-8.scope. Apr 12 21:45:48.966176 sudo[1603]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 21:45:48.966294 sudo[1603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:45:48.967997 sudo[1603]: pam_unix(sudo:session): session closed for user root Apr 12 21:45:48.970259 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 21:45:48.970368 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:45:48.975704 systemd[1]: Stopping audit-rules.service... Apr 12 21:45:48.975000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 21:45:48.976705 auditctl[1606]: No rules Apr 12 21:45:48.976878 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 21:45:48.976969 systemd[1]: Stopped audit-rules.service. Apr 12 21:45:48.977828 systemd[1]: Starting audit-rules.service... Apr 12 21:45:48.982006 kernel: kauditd_printk_skb: 96 callbacks suppressed Apr 12 21:45:48.982032 kernel: audit: type=1305 audit(1712958348.975:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 21:45:48.987512 augenrules[1623]: No rules Apr 12 21:45:48.987788 systemd[1]: Finished audit-rules.service. Apr 12 21:45:48.988360 sudo[1602]: pam_unix(sudo:session): session closed for user root Apr 12 21:45:48.989215 sshd[1599]: pam_unix(sshd:session): session closed for user core Apr 12 21:45:48.991675 systemd[1]: sshd@5-145.40.90.149:22-147.75.109.163:60648.service: Deactivated successfully. Apr 12 21:45:48.992203 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 21:45:48.992819 systemd-logind[1462]: Session 8 logged out. Waiting for processes to exit. Apr 12 21:45:48.993846 systemd[1]: Started sshd@6-145.40.90.149:22-147.75.109.163:60662.service. Apr 12 21:45:48.994668 systemd-logind[1462]: Removed session 8. Apr 12 21:45:48.975000 audit[1606]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffded0f3120 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.028711 kernel: audit: type=1300 audit(1712958348.975:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffded0f3120 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.028791 kernel: audit: type=1327 audit(1712958348.975:172): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 21:45:48.975000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 21:45:49.038252 kernel: audit: type=1131 audit(1712958348.975:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:48.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.060775 kernel: audit: type=1130 audit(1712958348.986:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:48.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.071142 sshd[1629]: Accepted publickey for core from 147.75.109.163 port 60662 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 21:45:49.072567 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:45:49.075141 systemd-logind[1462]: New session 9 of user core. Apr 12 21:45:49.076237 systemd[1]: Started session-9.scope. Apr 12 21:45:49.083313 kernel: audit: type=1106 audit(1712958348.987:175): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:48.987000 audit[1602]: USER_END pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.109432 kernel: audit: type=1104 audit(1712958348.987:176): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:48.987000 audit[1602]: CRED_DISP pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.123224 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 21:45:49.123341 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:45:49.133058 kernel: audit: type=1106 audit(1712958348.988:177): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:48.988000 audit[1599]: USER_END pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:49.165323 kernel: audit: type=1104 audit(1712958348.988:178): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:48.988000 audit[1599]: CRED_DISP pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:49.191317 kernel: audit: type=1131 audit(1712958348.990:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-145.40.90.149:22-147.75.109.163:60648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:48.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-145.40.90.149:22-147.75.109.163:60648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:48.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-145.40.90.149:22-147.75.109.163:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.069000 audit[1629]: USER_ACCT pid=1629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:49.071000 audit[1629]: CRED_ACQ pid=1629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:49.071000 audit[1629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcea65c770 a2=3 a3=0 items=0 ppid=1 pid=1629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:45:49.077000 audit[1629]: USER_START pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:49.078000 audit[1631]: CRED_ACQ pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:45:49.121000 audit[1632]: USER_ACCT pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.122000 audit[1632]: CRED_REFR pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.123000 audit[1632]: USER_START pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.614314 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 21:45:49.618334 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 21:45:49.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:49.618501 systemd[1]: Reached target network-online.target. Apr 12 21:45:49.619075 systemd[1]: Starting docker.service... Apr 12 21:45:49.635512 env[1653]: time="2024-04-12T21:45:49.635486607Z" level=info msg="Starting up" Apr 12 21:45:49.636226 env[1653]: time="2024-04-12T21:45:49.636214327Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 21:45:49.636226 env[1653]: time="2024-04-12T21:45:49.636224614Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 21:45:49.636329 env[1653]: time="2024-04-12T21:45:49.636277094Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 21:45:49.636329 env[1653]: time="2024-04-12T21:45:49.636286693Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 21:45:49.637016 env[1653]: time="2024-04-12T21:45:49.637005849Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 21:45:49.637016 env[1653]: time="2024-04-12T21:45:49.637013502Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 21:45:49.637077 env[1653]: time="2024-04-12T21:45:49.637022931Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 21:45:49.637077 env[1653]: time="2024-04-12T21:45:49.637030621Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 21:45:49.801878 env[1653]: time="2024-04-12T21:45:49.801854861Z" level=info msg="Loading containers: start." Apr 12 21:45:49.840000 audit[1696]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.840000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffee23bd3b0 a2=0 a3=7ffee23bd39c items=0 ppid=1653 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.840000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 21:45:49.841000 audit[1698]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.841000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffec7c9650 a2=0 a3=7fffec7c963c items=0 ppid=1653 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 21:45:49.842000 audit[1700]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.842000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffec908c520 a2=0 a3=7ffec908c50c items=0 ppid=1653 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.842000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 21:45:49.843000 audit[1702]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.843000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe7eca24c0 a2=0 a3=7ffe7eca24ac items=0 ppid=1653 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.843000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 21:45:49.844000 audit[1704]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.844000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc80eb6330 a2=0 a3=7ffc80eb631c items=0 ppid=1653 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 21:45:49.874000 audit[1709]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.874000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc074cb010 a2=0 a3=7ffc074caffc items=0 ppid=1653 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.874000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 21:45:49.879000 audit[1711]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.879000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff735f3da0 a2=0 a3=7fff735f3d8c items=0 ppid=1653 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 21:45:49.880000 audit[1713]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.880000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffceb8aa160 a2=0 a3=7ffceb8aa14c items=0 ppid=1653 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.880000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 21:45:49.882000 audit[1715]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.882000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd3e85e350 a2=0 a3=7ffd3e85e33c items=0 ppid=1653 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.882000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:45:49.887000 audit[1719]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.887000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdf50c1180 a2=0 a3=7ffdf50c116c items=0 ppid=1653 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:45:49.888000 audit[1720]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.888000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd177f8440 a2=0 a3=7ffd177f842c items=0 ppid=1653 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.888000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:45:49.909264 kernel: Initializing XFRM netlink socket Apr 12 21:45:49.936279 env[1653]: time="2024-04-12T21:45:49.936239296Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 21:45:49.946000 audit[1728]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.946000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd128a3260 a2=0 a3=7ffd128a324c items=0 ppid=1653 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 21:45:49.960000 audit[1731]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.960000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcc739d7b0 a2=0 a3=7ffcc739d79c items=0 ppid=1653 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 21:45:49.962000 audit[1734]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.962000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe8c5b4350 a2=0 a3=7ffe8c5b433c items=0 ppid=1653 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 21:45:49.963000 audit[1736]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.963000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcad6c9ec0 a2=0 a3=7ffcad6c9eac items=0 ppid=1653 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 21:45:49.965000 audit[1738]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.965000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd738893c0 a2=0 a3=7ffd738893ac items=0 ppid=1653 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 21:45:49.966000 audit[1740]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.966000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc6b8fc2a0 a2=0 a3=7ffc6b8fc28c items=0 ppid=1653 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 21:45:49.967000 audit[1742]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.967000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffed798ed20 a2=0 a3=7ffed798ed0c items=0 ppid=1653 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.967000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 21:45:49.974000 audit[1745]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.974000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc9e1fa270 a2=0 a3=7ffc9e1fa25c items=0 ppid=1653 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 21:45:49.975000 audit[1747]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.975000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd28ef1aa0 a2=0 a3=7ffd28ef1a8c items=0 ppid=1653 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 21:45:49.977000 audit[1749]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.977000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc83d7ec40 a2=0 a3=7ffc83d7ec2c items=0 ppid=1653 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.977000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 21:45:49.978000 audit[1751]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.978000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf8821100 a2=0 a3=7ffdf88210ec items=0 ppid=1653 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 21:45:49.980169 systemd-networkd[1320]: docker0: Link UP Apr 12 21:45:49.997000 audit[1755]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.997000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd93edba20 a2=0 a3=7ffd93edba0c items=0 ppid=1653 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:45:49.999000 audit[1756]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:45:49.999000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffead8927f0 a2=0 a3=7ffead8927dc items=0 ppid=1653 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:45:49.999000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 21:45:50.000842 env[1653]: time="2024-04-12T21:45:50.000769327Z" level=info msg="Loading containers: done." Apr 12 21:45:50.015951 env[1653]: time="2024-04-12T21:45:50.015858282Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 21:45:50.016256 env[1653]: time="2024-04-12T21:45:50.016197657Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 21:45:50.016477 env[1653]: time="2024-04-12T21:45:50.016408166Z" level=info msg="Daemon has completed initialization" Apr 12 21:45:50.017245 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3356779640-merged.mount: Deactivated successfully. Apr 12 21:45:50.038016 systemd[1]: Started docker.service. Apr 12 21:45:50.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:50.055072 env[1653]: time="2024-04-12T21:45:50.054939048Z" level=info msg="API listen on /run/docker.sock" Apr 12 21:45:50.102980 systemd[1]: Reloading. Apr 12 21:45:50.161458 /usr/lib/systemd/system-generators/torcx-generator[1806]: time="2024-04-12T21:45:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:45:50.161479 /usr/lib/systemd/system-generators/torcx-generator[1806]: time="2024-04-12T21:45:50Z" level=info msg="torcx already run" Apr 12 21:45:50.212645 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:45:50.212653 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:45:50.224949 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit: BPF prog-id=37 op=LOAD Apr 12 21:45:50.269000 audit: BPF prog-id=26 op=UNLOAD Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit: BPF prog-id=38 op=LOAD Apr 12 21:45:50.269000 audit: BPF prog-id=27 op=UNLOAD Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit: BPF prog-id=39 op=LOAD Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.269000 audit: BPF prog-id=40 op=LOAD Apr 12 21:45:50.269000 audit: BPF prog-id=28 op=UNLOAD Apr 12 21:45:50.269000 audit: BPF prog-id=29 op=UNLOAD Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.270000 audit: BPF prog-id=41 op=LOAD Apr 12 21:45:50.270000 audit: BPF prog-id=35 op=UNLOAD Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit: BPF prog-id=42 op=LOAD Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit: BPF prog-id=43 op=LOAD Apr 12 21:45:50.272000 audit: BPF prog-id=24 op=UNLOAD Apr 12 21:45:50.272000 audit: BPF prog-id=25 op=UNLOAD Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit: BPF prog-id=44 op=LOAD Apr 12 21:45:50.272000 audit: BPF prog-id=32 op=UNLOAD Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit: BPF prog-id=45 op=LOAD Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit: BPF prog-id=46 op=LOAD Apr 12 21:45:50.273000 audit: BPF prog-id=33 op=UNLOAD Apr 12 21:45:50.273000 audit: BPF prog-id=34 op=UNLOAD Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit: BPF prog-id=47 op=LOAD Apr 12 21:45:50.273000 audit: BPF prog-id=21 op=UNLOAD Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit: BPF prog-id=48 op=LOAD Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.273000 audit: BPF prog-id=49 op=LOAD Apr 12 21:45:50.273000 audit: BPF prog-id=22 op=UNLOAD Apr 12 21:45:50.273000 audit: BPF prog-id=23 op=UNLOAD Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit: BPF prog-id=50 op=LOAD Apr 12 21:45:50.274000 audit: BPF prog-id=31 op=UNLOAD Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:45:50.274000 audit: BPF prog-id=51 op=LOAD Apr 12 21:45:50.274000 audit: BPF prog-id=30 op=UNLOAD Apr 12 21:45:50.280449 systemd[1]: Started kubelet.service. Apr 12 21:45:50.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:45:50.303506 kubelet[1865]: E0412 21:45:50.303443 1865 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 21:45:50.304761 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 21:45:50.304832 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 21:45:50.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:45:50.961552 env[1474]: time="2024-04-12T21:45:50.961508383Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 21:45:51.884525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount809982695.mount: Deactivated successfully. Apr 12 21:45:53.444205 env[1474]: time="2024-04-12T21:45:53.444146259Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:53.444797 env[1474]: time="2024-04-12T21:45:53.444782791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:53.445754 env[1474]: time="2024-04-12T21:45:53.445740885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:53.446752 env[1474]: time="2024-04-12T21:45:53.446738934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:53.447218 env[1474]: time="2024-04-12T21:45:53.447204341Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142\"" Apr 12 21:45:53.452963 env[1474]: time="2024-04-12T21:45:53.452944170Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 21:45:55.467152 env[1474]: time="2024-04-12T21:45:55.467096082Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:55.467724 env[1474]: time="2024-04-12T21:45:55.467686530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:55.468673 env[1474]: time="2024-04-12T21:45:55.468628954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:55.469545 env[1474]: time="2024-04-12T21:45:55.469511428Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:55.469967 env[1474]: time="2024-04-12T21:45:55.469914739Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad\"" Apr 12 21:45:55.475888 env[1474]: time="2024-04-12T21:45:55.475873322Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 21:45:56.735221 env[1474]: time="2024-04-12T21:45:56.735172538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:56.735857 env[1474]: time="2024-04-12T21:45:56.735815972Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:56.736831 env[1474]: time="2024-04-12T21:45:56.736789325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:56.737741 env[1474]: time="2024-04-12T21:45:56.737693212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:56.738156 env[1474]: time="2024-04-12T21:45:56.738118470Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4\"" Apr 12 21:45:56.743945 env[1474]: time="2024-04-12T21:45:56.743893122Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 21:45:57.727947 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount371766058.mount: Deactivated successfully. Apr 12 21:45:58.062625 env[1474]: time="2024-04-12T21:45:58.062524772Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.063206 env[1474]: time="2024-04-12T21:45:58.063157821Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.063972 env[1474]: time="2024-04-12T21:45:58.063938110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.064515 env[1474]: time="2024-04-12T21:45:58.064469224Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.065708 env[1474]: time="2024-04-12T21:45:58.065690899Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 21:45:58.072185 env[1474]: time="2024-04-12T21:45:58.072170955Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 21:45:58.587544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2545500563.mount: Deactivated successfully. Apr 12 21:45:58.589321 env[1474]: time="2024-04-12T21:45:58.589253612Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.589976 env[1474]: time="2024-04-12T21:45:58.589944504Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.590733 env[1474]: time="2024-04-12T21:45:58.590721814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.591974 env[1474]: time="2024-04-12T21:45:58.591946564Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:45:58.592655 env[1474]: time="2024-04-12T21:45:58.592612457Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 21:45:58.597775 env[1474]: time="2024-04-12T21:45:58.597742496Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 21:45:59.204160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4214530155.mount: Deactivated successfully. Apr 12 21:46:00.357863 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 21:46:00.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:00.358452 systemd[1]: Stopped kubelet.service. Apr 12 21:46:00.361937 systemd[1]: Started kubelet.service. Apr 12 21:46:00.364213 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 21:46:00.364292 kernel: audit: type=1130 audit(1712958360.357:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:00.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:00.386631 kubelet[1959]: E0412 21:46:00.386609 1959 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 21:46:00.388810 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 21:46:00.388881 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 21:46:00.408496 kernel: audit: type=1131 audit(1712958360.357:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:00.408527 kernel: audit: type=1130 audit(1712958360.361:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:00.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:00.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:46:00.448305 kernel: audit: type=1131 audit(1712958360.387:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:46:02.300415 env[1474]: time="2024-04-12T21:46:02.300357934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:02.301069 env[1474]: time="2024-04-12T21:46:02.301019333Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:02.302155 env[1474]: time="2024-04-12T21:46:02.302106979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:02.303198 env[1474]: time="2024-04-12T21:46:02.303164245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:02.303685 env[1474]: time="2024-04-12T21:46:02.303638238Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Apr 12 21:46:02.309149 env[1474]: time="2024-04-12T21:46:02.309136603Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 21:46:02.862202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1613184909.mount: Deactivated successfully. Apr 12 21:46:03.331347 env[1474]: time="2024-04-12T21:46:03.331207337Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:03.331764 env[1474]: time="2024-04-12T21:46:03.331750488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:03.332655 env[1474]: time="2024-04-12T21:46:03.332614041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:03.333318 env[1474]: time="2024-04-12T21:46:03.333304890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:03.333863 env[1474]: time="2024-04-12T21:46:03.333848570Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 21:46:05.046213 systemd[1]: Stopped kubelet.service. Apr 12 21:46:05.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:05.054468 systemd[1]: Reloading. Apr 12 21:46:05.090284 /usr/lib/systemd/system-generators/torcx-generator[2114]: time="2024-04-12T21:46:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:46:05.090308 /usr/lib/systemd/system-generators/torcx-generator[2114]: time="2024-04-12T21:46:05Z" level=info msg="torcx already run" Apr 12 21:46:05.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:05.106301 kernel: audit: type=1130 audit(1712958365.046:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:05.106370 kernel: audit: type=1131 audit(1712958365.046:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:05.184316 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:46:05.184324 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:46:05.196564 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.360986 kernel: audit: type=1400 audit(1712958365.239:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.361057 kernel: audit: type=1400 audit(1712958365.239:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.361075 kernel: audit: type=1400 audit(1712958365.239:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.424512 kernel: audit: type=1400 audit(1712958365.239:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.487883 kernel: audit: type=1400 audit(1712958365.239:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.551423 kernel: audit: type=1400 audit(1712958365.239:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.614937 kernel: audit: type=1400 audit(1712958365.239:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.678551 kernel: audit: type=1400 audit(1712958365.239:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.742547 kernel: audit: type=1400 audit(1712958365.239:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.806178 kernel: audit: type=1400 audit(1712958365.359:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.869656 kernel: audit: type=1334 audit(1712958365.359:405): prog-id=52 op=LOAD Apr 12 21:46:05.359000 audit: BPF prog-id=52 op=LOAD Apr 12 21:46:05.359000 audit: BPF prog-id=37 op=UNLOAD Apr 12 21:46:05.925990 kernel: audit: type=1334 audit(1712958365.359:406): prog-id=37 op=UNLOAD Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit: BPF prog-id=53 op=LOAD Apr 12 21:46:05.486000 audit: BPF prog-id=38 op=UNLOAD Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit: BPF prog-id=54 op=LOAD Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit: BPF prog-id=55 op=LOAD Apr 12 21:46:05.741000 audit: BPF prog-id=39 op=UNLOAD Apr 12 21:46:05.741000 audit: BPF prog-id=40 op=UNLOAD Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.868000 audit: BPF prog-id=56 op=LOAD Apr 12 21:46:05.868000 audit: BPF prog-id=41 op=UNLOAD Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit: BPF prog-id=57 op=LOAD Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.924000 audit: BPF prog-id=58 op=LOAD Apr 12 21:46:05.924000 audit: BPF prog-id=42 op=UNLOAD Apr 12 21:46:05.924000 audit: BPF prog-id=43 op=UNLOAD Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit: BPF prog-id=59 op=LOAD Apr 12 21:46:05.925000 audit: BPF prog-id=44 op=UNLOAD Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit: BPF prog-id=60 op=LOAD Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit: BPF prog-id=61 op=LOAD Apr 12 21:46:05.925000 audit: BPF prog-id=45 op=UNLOAD Apr 12 21:46:05.925000 audit: BPF prog-id=46 op=UNLOAD Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit: BPF prog-id=62 op=LOAD Apr 12 21:46:05.926000 audit: BPF prog-id=47 op=UNLOAD Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit: BPF prog-id=63 op=LOAD Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit: BPF prog-id=64 op=LOAD Apr 12 21:46:05.926000 audit: BPF prog-id=48 op=UNLOAD Apr 12 21:46:05.926000 audit: BPF prog-id=49 op=UNLOAD Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit: BPF prog-id=65 op=LOAD Apr 12 21:46:05.926000 audit: BPF prog-id=50 op=UNLOAD Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:05.927000 audit: BPF prog-id=66 op=LOAD Apr 12 21:46:05.927000 audit: BPF prog-id=51 op=UNLOAD Apr 12 21:46:05.936016 systemd[1]: Started kubelet.service. Apr 12 21:46:05.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:05.957735 kubelet[2173]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:46:05.957735 kubelet[2173]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 21:46:05.957735 kubelet[2173]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:46:05.957735 kubelet[2173]: I0412 21:46:05.957721 2173 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 21:46:06.250486 kubelet[2173]: I0412 21:46:06.250428 2173 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 21:46:06.250486 kubelet[2173]: I0412 21:46:06.250454 2173 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 21:46:06.250603 kubelet[2173]: I0412 21:46:06.250566 2173 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 21:46:06.253546 kubelet[2173]: I0412 21:46:06.253481 2173 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 21:46:06.254164 kubelet[2173]: E0412 21:46:06.254129 2173 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://145.40.90.149:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.283839 kubelet[2173]: I0412 21:46:06.283791 2173 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 21:46:06.284112 kubelet[2173]: I0412 21:46:06.284048 2173 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 21:46:06.284332 kubelet[2173]: I0412 21:46:06.284266 2173 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 21:46:06.284332 kubelet[2173]: I0412 21:46:06.284301 2173 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 21:46:06.284332 kubelet[2173]: I0412 21:46:06.284316 2173 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 21:46:06.284649 kubelet[2173]: I0412 21:46:06.284433 2173 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:46:06.284649 kubelet[2173]: I0412 21:46:06.284535 2173 kubelet.go:393] "Attempting to sync node with API server" Apr 12 21:46:06.284649 kubelet[2173]: I0412 21:46:06.284554 2173 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 21:46:06.284649 kubelet[2173]: I0412 21:46:06.284583 2173 kubelet.go:309] "Adding apiserver pod source" Apr 12 21:46:06.284649 kubelet[2173]: I0412 21:46:06.284605 2173 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 21:46:06.285163 kubelet[2173]: I0412 21:46:06.285138 2173 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 21:46:06.285423 kubelet[2173]: W0412 21:46:06.285335 2173 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://145.40.90.149:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.285423 kubelet[2173]: W0412 21:46:06.285366 2173 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://145.40.90.149:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-26e8ad9098&limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.285423 kubelet[2173]: E0412 21:46:06.285418 2173 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://145.40.90.149:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.285637 kubelet[2173]: W0412 21:46:06.285458 2173 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 21:46:06.285637 kubelet[2173]: E0412 21:46:06.285460 2173 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://145.40.90.149:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-26e8ad9098&limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.286117 kubelet[2173]: I0412 21:46:06.286073 2173 server.go:1232] "Started kubelet" Apr 12 21:46:06.286195 kubelet[2173]: I0412 21:46:06.286152 2173 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 21:46:06.286271 kubelet[2173]: I0412 21:46:06.286188 2173 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 21:46:06.286563 kubelet[2173]: E0412 21:46:06.286539 2173 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 21:46:06.286563 kubelet[2173]: I0412 21:46:06.286556 2173 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 21:46:06.286665 kubelet[2173]: E0412 21:46:06.286450 2173 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-26e8ad9098.17c5a68ef983243a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-26e8ad9098", UID:"ci-3510.3.3-a-26e8ad9098", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-26e8ad9098"}, FirstTimestamp:time.Date(2024, time.April, 12, 21, 46, 6, 286029882, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 21, 46, 6, 286029882, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-26e8ad9098"}': 'Post "https://145.40.90.149:6443/api/v1/namespaces/default/events": dial tcp 145.40.90.149:6443: connect: connection refused'(may retry after sleeping) Apr 12 21:46:06.286665 kubelet[2173]: E0412 21:46:06.286571 2173 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 21:46:06.288078 kubelet[2173]: I0412 21:46:06.288025 2173 server.go:462] "Adding debug handlers to kubelet server" Apr 12 21:46:06.288000 audit[2173]: AVC avc: denied { mac_admin } for pid=2173 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:06.288000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:46:06.288000 audit[2173]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b28030 a1=c00014e8d0 a2=c000b28000 a3=25 items=0 ppid=1 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.288000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:46:06.288000 audit[2173]: AVC avc: denied { mac_admin } for pid=2173 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:06.288000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:46:06.288000 audit[2173]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00040a340 a1=c00014e900 a2=c000b280c0 a3=25 items=0 ppid=1 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.288000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:46:06.289166 kubelet[2173]: I0412 21:46:06.288542 2173 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 21:46:06.289166 kubelet[2173]: I0412 21:46:06.288586 2173 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 21:46:06.289166 kubelet[2173]: I0412 21:46:06.288660 2173 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 21:46:06.289166 kubelet[2173]: I0412 21:46:06.288762 2173 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 21:46:06.289166 kubelet[2173]: I0412 21:46:06.288826 2173 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 21:46:06.289166 kubelet[2173]: I0412 21:46:06.288909 2173 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 21:46:06.289166 kubelet[2173]: E0412 21:46:06.289137 2173 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://145.40.90.149:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-26e8ad9098?timeout=10s\": dial tcp 145.40.90.149:6443: connect: connection refused" interval="200ms" Apr 12 21:46:06.289698 kubelet[2173]: W0412 21:46:06.289185 2173 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://145.40.90.149:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.289698 kubelet[2173]: E0412 21:46:06.289248 2173 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://145.40.90.149:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.291000 audit[2197]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.291000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd12750270 a2=0 a3=7ffd1275025c items=0 ppid=2173 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 21:46:06.292000 audit[2198]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.292000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffac260f70 a2=0 a3=7fffac260f5c items=0 ppid=2173 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 21:46:06.294000 audit[2200]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.294000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc96f58b0 a2=0 a3=7fffc96f589c items=0 ppid=2173 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:46:06.296000 audit[2202]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.296000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe79e62120 a2=0 a3=7ffe79e6210c items=0 ppid=2173 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:46:06.303000 audit[2205]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.303000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc340497b0 a2=0 a3=7ffc3404979c items=0 ppid=2173 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 21:46:06.303953 kubelet[2173]: I0412 21:46:06.303884 2173 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 21:46:06.304000 audit[2206]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:06.304000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1af58ff0 a2=0 a3=7fff1af58fdc items=0 ppid=2173 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 21:46:06.304000 audit[2208]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.304000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe007e6ae0 a2=0 a3=7ffe007e6acc items=0 ppid=2173 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 21:46:06.305145 kubelet[2173]: I0412 21:46:06.304805 2173 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 21:46:06.305145 kubelet[2173]: I0412 21:46:06.304833 2173 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 21:46:06.305145 kubelet[2173]: I0412 21:46:06.304848 2173 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 21:46:06.305145 kubelet[2173]: E0412 21:46:06.304909 2173 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 21:46:06.305305 kubelet[2173]: W0412 21:46:06.305177 2173 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://145.40.90.149:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.305305 kubelet[2173]: E0412 21:46:06.305211 2173 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://145.40.90.149:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:06.305000 audit[2209]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:06.305000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf630dae0 a2=0 a3=7ffcf630dacc items=0 ppid=2173 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 21:46:06.305000 audit[2210]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.305000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc219f4a50 a2=0 a3=7ffc219f4a3c items=0 ppid=2173 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 21:46:06.306000 audit[2211]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:06.306000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff02a99e80 a2=0 a3=7fff02a99e6c items=0 ppid=2173 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 21:46:06.306000 audit[2212]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:06.306000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2b3883d0 a2=0 a3=7fff2b3883bc items=0 ppid=2173 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 21:46:06.307000 audit[2213]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:06.307000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb3c3afa0 a2=0 a3=7ffcb3c3af8c items=0 ppid=2173 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 21:46:06.406215 kubelet[2173]: E0412 21:46:06.406110 2173 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 21:46:06.443365 kubelet[2173]: I0412 21:46:06.443275 2173 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.444008 kubelet[2173]: E0412 21:46:06.443927 2173 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://145.40.90.149:6443/api/v1/nodes\": dial tcp 145.40.90.149:6443: connect: connection refused" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.444389 kubelet[2173]: I0412 21:46:06.444315 2173 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 21:46:06.444389 kubelet[2173]: I0412 21:46:06.444352 2173 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 21:46:06.444389 kubelet[2173]: I0412 21:46:06.444388 2173 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:46:06.446074 kubelet[2173]: I0412 21:46:06.446007 2173 policy_none.go:49] "None policy: Start" Apr 12 21:46:06.447117 kubelet[2173]: I0412 21:46:06.447035 2173 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 21:46:06.447117 kubelet[2173]: I0412 21:46:06.447094 2173 state_mem.go:35] "Initializing new in-memory state store" Apr 12 21:46:06.457542 systemd[1]: Created slice kubepods.slice. Apr 12 21:46:06.463606 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 21:46:06.465174 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 21:46:06.472892 kubelet[2173]: I0412 21:46:06.472828 2173 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 21:46:06.472892 kubelet[2173]: I0412 21:46:06.472861 2173 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 21:46:06.472000 audit[2173]: AVC avc: denied { mac_admin } for pid=2173 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:06.472000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:46:06.472000 audit[2173]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001516450 a1=c0012d0e10 a2=c001516420 a3=25 items=0 ppid=1 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:06.472000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:46:06.473161 kubelet[2173]: I0412 21:46:06.472975 2173 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 21:46:06.473226 kubelet[2173]: E0412 21:46:06.473217 2173 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-26e8ad9098\" not found" Apr 12 21:46:06.490325 kubelet[2173]: E0412 21:46:06.490287 2173 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://145.40.90.149:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-26e8ad9098?timeout=10s\": dial tcp 145.40.90.149:6443: connect: connection refused" interval="400ms" Apr 12 21:46:06.607036 kubelet[2173]: I0412 21:46:06.606936 2173 topology_manager.go:215] "Topology Admit Handler" podUID="edbfafbd8240d276ee12588946ac8f02" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.610604 kubelet[2173]: I0412 21:46:06.610525 2173 topology_manager.go:215] "Topology Admit Handler" podUID="f0150c9cfba6fe282b50425a463d41b6" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.612095 kubelet[2173]: I0412 21:46:06.612084 2173 topology_manager.go:215] "Topology Admit Handler" podUID="60c72bb499f294ab36f6ab49767801d2" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.615221 systemd[1]: Created slice kubepods-burstable-podedbfafbd8240d276ee12588946ac8f02.slice. Apr 12 21:46:06.627335 systemd[1]: Created slice kubepods-burstable-podf0150c9cfba6fe282b50425a463d41b6.slice. Apr 12 21:46:06.647120 systemd[1]: Created slice kubepods-burstable-pod60c72bb499f294ab36f6ab49767801d2.slice. Apr 12 21:46:06.647669 kubelet[2173]: I0412 21:46:06.647596 2173 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.648368 kubelet[2173]: E0412 21:46:06.648294 2173 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://145.40.90.149:6443/api/v1/nodes\": dial tcp 145.40.90.149:6443: connect: connection refused" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.691697 kubelet[2173]: I0412 21:46:06.691587 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.691697 kubelet[2173]: I0412 21:46:06.691680 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692080 kubelet[2173]: I0412 21:46:06.691835 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/60c72bb499f294ab36f6ab49767801d2-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-26e8ad9098\" (UID: \"60c72bb499f294ab36f6ab49767801d2\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692080 kubelet[2173]: I0412 21:46:06.691920 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/edbfafbd8240d276ee12588946ac8f02-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" (UID: \"edbfafbd8240d276ee12588946ac8f02\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692080 kubelet[2173]: I0412 21:46:06.691982 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/edbfafbd8240d276ee12588946ac8f02-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" (UID: \"edbfafbd8240d276ee12588946ac8f02\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692080 kubelet[2173]: I0412 21:46:06.692051 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692491 kubelet[2173]: I0412 21:46:06.692113 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/edbfafbd8240d276ee12588946ac8f02-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" (UID: \"edbfafbd8240d276ee12588946ac8f02\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692491 kubelet[2173]: I0412 21:46:06.692186 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.692491 kubelet[2173]: I0412 21:46:06.692265 2173 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:06.892100 kubelet[2173]: E0412 21:46:06.891880 2173 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://145.40.90.149:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-26e8ad9098?timeout=10s\": dial tcp 145.40.90.149:6443: connect: connection refused" interval="800ms" Apr 12 21:46:06.928188 env[1474]: time="2024-04-12T21:46:06.928073321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-26e8ad9098,Uid:edbfafbd8240d276ee12588946ac8f02,Namespace:kube-system,Attempt:0,}" Apr 12 21:46:06.942329 env[1474]: time="2024-04-12T21:46:06.942199013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-26e8ad9098,Uid:f0150c9cfba6fe282b50425a463d41b6,Namespace:kube-system,Attempt:0,}" Apr 12 21:46:06.952412 env[1474]: time="2024-04-12T21:46:06.952335602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-26e8ad9098,Uid:60c72bb499f294ab36f6ab49767801d2,Namespace:kube-system,Attempt:0,}" Apr 12 21:46:07.052588 kubelet[2173]: I0412 21:46:07.052493 2173 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:07.053306 kubelet[2173]: E0412 21:46:07.053150 2173 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://145.40.90.149:6443/api/v1/nodes\": dial tcp 145.40.90.149:6443: connect: connection refused" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:07.382680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount960388611.mount: Deactivated successfully. Apr 12 21:46:07.383789 env[1474]: time="2024-04-12T21:46:07.383766761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.384797 env[1474]: time="2024-04-12T21:46:07.384784603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.385598 env[1474]: time="2024-04-12T21:46:07.385546296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.386211 env[1474]: time="2024-04-12T21:46:07.386200597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.386668 env[1474]: time="2024-04-12T21:46:07.386657645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.387656 env[1474]: time="2024-04-12T21:46:07.387642389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.389231 env[1474]: time="2024-04-12T21:46:07.389213230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.391091 env[1474]: time="2024-04-12T21:46:07.391071822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.392384 env[1474]: time="2024-04-12T21:46:07.392357360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.393199 env[1474]: time="2024-04-12T21:46:07.393187989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.393658 env[1474]: time="2024-04-12T21:46:07.393644164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.394082 env[1474]: time="2024-04-12T21:46:07.394069117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:07.398071 env[1474]: time="2024-04-12T21:46:07.398033028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:07.398071 env[1474]: time="2024-04-12T21:46:07.398061393Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:07.398175 env[1474]: time="2024-04-12T21:46:07.398074731Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:07.398175 env[1474]: time="2024-04-12T21:46:07.398160424Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0484be3218000d907ce8a25225aa874876996c7f7d4cc1fa47fbb9cca08a4715 pid=2223 runtime=io.containerd.runc.v2 Apr 12 21:46:07.399314 env[1474]: time="2024-04-12T21:46:07.399283655Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:07.399314 env[1474]: time="2024-04-12T21:46:07.399304102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:07.399390 env[1474]: time="2024-04-12T21:46:07.399314533Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:07.399390 env[1474]: time="2024-04-12T21:46:07.399377462Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f71934b92128c66ca593e61dd37bd268ea984da6d06d5edcc968ccde0323da4 pid=2240 runtime=io.containerd.runc.v2 Apr 12 21:46:07.400690 env[1474]: time="2024-04-12T21:46:07.400661354Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:07.400690 env[1474]: time="2024-04-12T21:46:07.400682050Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:07.400758 env[1474]: time="2024-04-12T21:46:07.400690591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:07.400837 env[1474]: time="2024-04-12T21:46:07.400818330Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df9451cf87dc1d76159378f37852e860ccfa5e8df12a8131ab3fd25f70f8b613 pid=2257 runtime=io.containerd.runc.v2 Apr 12 21:46:07.404669 systemd[1]: Started cri-containerd-0484be3218000d907ce8a25225aa874876996c7f7d4cc1fa47fbb9cca08a4715.scope. Apr 12 21:46:07.406859 systemd[1]: Started cri-containerd-4f71934b92128c66ca593e61dd37bd268ea984da6d06d5edcc968ccde0323da4.scope. Apr 12 21:46:07.407611 systemd[1]: Started cri-containerd-df9451cf87dc1d76159378f37852e860ccfa5e8df12a8131ab3fd25f70f8b613.scope. Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit: BPF prog-id=67 op=LOAD Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=2223 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383462653332313830303064393037636538613235323235616138 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=c items=0 ppid=2223 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383462653332313830303064393037636538613235323235616138 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit: BPF prog-id=68 op=LOAD Apr 12 21:46:07.409000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c000106e80 items=0 ppid=2223 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383462653332313830303064393037636538613235323235616138 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.409000 audit: BPF prog-id=69 op=LOAD Apr 12 21:46:07.409000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c000106ec8 items=0 ppid=2223 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383462653332313830303064393037636538613235323235616138 Apr 12 21:46:07.410000 audit: BPF prog-id=69 op=UNLOAD Apr 12 21:46:07.410000 audit: BPF prog-id=68 op=UNLOAD Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit: BPF prog-id=70 op=LOAD Apr 12 21:46:07.410000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0001072d8 items=0 ppid=2223 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034383462653332313830303064393037636538613235323235616138 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit: BPF prog-id=71 op=LOAD Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2240 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373139333462393231323863363663613539336536316464333762 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2240 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373139333462393231323863363663613539336536316464333762 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit: BPF prog-id=72 op=LOAD Apr 12 21:46:07.410000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000246d0 items=0 ppid=2240 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373139333462393231323863363663613539336536316464333762 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit: BPF prog-id=73 op=LOAD Apr 12 21:46:07.410000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024718 items=0 ppid=2240 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373139333462393231323863363663613539336536316464333762 Apr 12 21:46:07.410000 audit: BPF prog-id=73 op=UNLOAD Apr 12 21:46:07.410000 audit: BPF prog-id=72 op=UNLOAD Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.410000 audit: BPF prog-id=74 op=LOAD Apr 12 21:46:07.410000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000024b28 items=0 ppid=2240 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466373139333462393231323863363663613539336536316464333762 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit: BPF prog-id=75 op=LOAD Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2257 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393435316366383764633164373631353933373866333738353265 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2257 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393435316366383764633164373631353933373866333738353265 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit: BPF prog-id=76 op=LOAD Apr 12 21:46:07.412000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c2d00 items=0 ppid=2257 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393435316366383764633164373631353933373866333738353265 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit: BPF prog-id=77 op=LOAD Apr 12 21:46:07.412000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c2d48 items=0 ppid=2257 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393435316366383764633164373631353933373866333738353265 Apr 12 21:46:07.412000 audit: BPF prog-id=77 op=UNLOAD Apr 12 21:46:07.412000 audit: BPF prog-id=76 op=UNLOAD Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.412000 audit: BPF prog-id=78 op=LOAD Apr 12 21:46:07.412000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c3158 items=0 ppid=2257 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393435316366383764633164373631353933373866333738353265 Apr 12 21:46:07.427918 env[1474]: time="2024-04-12T21:46:07.427889902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-26e8ad9098,Uid:edbfafbd8240d276ee12588946ac8f02,Namespace:kube-system,Attempt:0,} returns sandbox id \"0484be3218000d907ce8a25225aa874876996c7f7d4cc1fa47fbb9cca08a4715\"" Apr 12 21:46:07.428477 env[1474]: time="2024-04-12T21:46:07.428461838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-26e8ad9098,Uid:f0150c9cfba6fe282b50425a463d41b6,Namespace:kube-system,Attempt:0,} returns sandbox id \"4f71934b92128c66ca593e61dd37bd268ea984da6d06d5edcc968ccde0323da4\"" Apr 12 21:46:07.429766 env[1474]: time="2024-04-12T21:46:07.429743182Z" level=info msg="CreateContainer within sandbox \"4f71934b92128c66ca593e61dd37bd268ea984da6d06d5edcc968ccde0323da4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 21:46:07.429819 env[1474]: time="2024-04-12T21:46:07.429805666Z" level=info msg="CreateContainer within sandbox \"0484be3218000d907ce8a25225aa874876996c7f7d4cc1fa47fbb9cca08a4715\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 21:46:07.430280 env[1474]: time="2024-04-12T21:46:07.430265061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-26e8ad9098,Uid:60c72bb499f294ab36f6ab49767801d2,Namespace:kube-system,Attempt:0,} returns sandbox id \"df9451cf87dc1d76159378f37852e860ccfa5e8df12a8131ab3fd25f70f8b613\"" Apr 12 21:46:07.430530 kubelet[2173]: W0412 21:46:07.430506 2173 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://145.40.90.149:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:07.430573 kubelet[2173]: E0412 21:46:07.430542 2173 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://145.40.90.149:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 145.40.90.149:6443: connect: connection refused Apr 12 21:46:07.431799 env[1474]: time="2024-04-12T21:46:07.431784006Z" level=info msg="CreateContainer within sandbox \"df9451cf87dc1d76159378f37852e860ccfa5e8df12a8131ab3fd25f70f8b613\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 21:46:07.435536 env[1474]: time="2024-04-12T21:46:07.435492064Z" level=info msg="CreateContainer within sandbox \"0484be3218000d907ce8a25225aa874876996c7f7d4cc1fa47fbb9cca08a4715\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"438d8e6f0bc9c67e38858f0d4b2616ad5c4992dff6ecdafe0dfe81ca8b167be9\"" Apr 12 21:46:07.435770 env[1474]: time="2024-04-12T21:46:07.435753079Z" level=info msg="StartContainer for \"438d8e6f0bc9c67e38858f0d4b2616ad5c4992dff6ecdafe0dfe81ca8b167be9\"" Apr 12 21:46:07.436581 env[1474]: time="2024-04-12T21:46:07.436533998Z" level=info msg="CreateContainer within sandbox \"4f71934b92128c66ca593e61dd37bd268ea984da6d06d5edcc968ccde0323da4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a79c5b98159a204e25dcb77a1f1f99d0003053689453af04498e2523cf6e3854\"" Apr 12 21:46:07.436694 env[1474]: time="2024-04-12T21:46:07.436681213Z" level=info msg="StartContainer for \"a79c5b98159a204e25dcb77a1f1f99d0003053689453af04498e2523cf6e3854\"" Apr 12 21:46:07.438432 env[1474]: time="2024-04-12T21:46:07.438412762Z" level=info msg="CreateContainer within sandbox \"df9451cf87dc1d76159378f37852e860ccfa5e8df12a8131ab3fd25f70f8b613\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a92548828c31a6d1324a9263563a8d95f86240f77af92e190b04d0cb1b0c4ecf\"" Apr 12 21:46:07.438661 env[1474]: time="2024-04-12T21:46:07.438644137Z" level=info msg="StartContainer for \"a92548828c31a6d1324a9263563a8d95f86240f77af92e190b04d0cb1b0c4ecf\"" Apr 12 21:46:07.444281 systemd[1]: Started cri-containerd-438d8e6f0bc9c67e38858f0d4b2616ad5c4992dff6ecdafe0dfe81ca8b167be9.scope. Apr 12 21:46:07.445008 systemd[1]: Started cri-containerd-a79c5b98159a204e25dcb77a1f1f99d0003053689453af04498e2523cf6e3854.scope. Apr 12 21:46:07.446530 systemd[1]: Started cri-containerd-a92548828c31a6d1324a9263563a8d95f86240f77af92e190b04d0cb1b0c4ecf.scope. Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.449000 audit: BPF prog-id=79 op=LOAD Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2223 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386438653666306263396336376533383835386630643462323631 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=2223 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386438653666306263396336376533383835386630643462323631 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit: BPF prog-id=80 op=LOAD Apr 12 21:46:07.450000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c00031bbe0 items=0 ppid=2223 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386438653666306263396336376533383835386630643462323631 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit: BPF prog-id=81 op=LOAD Apr 12 21:46:07.450000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c00031bc28 items=0 ppid=2223 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386438653666306263396336376533383835386630643462323631 Apr 12 21:46:07.450000 audit: BPF prog-id=81 op=UNLOAD Apr 12 21:46:07.450000 audit: BPF prog-id=80 op=UNLOAD Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit: BPF prog-id=82 op=LOAD Apr 12 21:46:07.450000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c000384038 items=0 ppid=2223 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433386438653666306263396336376533383835386630643462323631 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.450000 audit: BPF prog-id=83 op=LOAD Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2240 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396335623938313539613230346532356463623737613166316639 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2240 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396335623938313539613230346532356463623737613166316639 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit: BPF prog-id=84 op=LOAD Apr 12 21:46:07.451000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fbdc0 items=0 ppid=2240 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396335623938313539613230346532356463623737613166316639 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit: BPF prog-id=85 op=LOAD Apr 12 21:46:07.451000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fbe08 items=0 ppid=2240 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396335623938313539613230346532356463623737613166316639 Apr 12 21:46:07.451000 audit: BPF prog-id=85 op=UNLOAD Apr 12 21:46:07.451000 audit: BPF prog-id=84 op=UNLOAD Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.451000 audit: BPF prog-id=86 op=LOAD Apr 12 21:46:07.451000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da218 items=0 ppid=2240 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137396335623938313539613230346532356463623737613166316639 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit: BPF prog-id=87 op=LOAD Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2257 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323534383832386333316136643133323461393236333536336138 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2257 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323534383832386333316136643133323461393236333536336138 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit: BPF prog-id=88 op=LOAD Apr 12 21:46:07.452000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002f7dc0 items=0 ppid=2257 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323534383832386333316136643133323461393236333536336138 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit: BPF prog-id=89 op=LOAD Apr 12 21:46:07.452000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002f7e08 items=0 ppid=2257 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323534383832386333316136643133323461393236333536336138 Apr 12 21:46:07.452000 audit: BPF prog-id=89 op=UNLOAD Apr 12 21:46:07.452000 audit: BPF prog-id=88 op=UNLOAD Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:07.452000 audit: BPF prog-id=90 op=LOAD Apr 12 21:46:07.452000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003f4218 items=0 ppid=2257 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:07.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139323534383832386333316136643133323461393236333536336138 Apr 12 21:46:07.470168 env[1474]: time="2024-04-12T21:46:07.470138238Z" level=info msg="StartContainer for \"a79c5b98159a204e25dcb77a1f1f99d0003053689453af04498e2523cf6e3854\" returns successfully" Apr 12 21:46:07.470278 env[1474]: time="2024-04-12T21:46:07.470209831Z" level=info msg="StartContainer for \"438d8e6f0bc9c67e38858f0d4b2616ad5c4992dff6ecdafe0dfe81ca8b167be9\" returns successfully" Apr 12 21:46:07.470309 env[1474]: time="2024-04-12T21:46:07.470276409Z" level=info msg="StartContainer for \"a92548828c31a6d1324a9263563a8d95f86240f77af92e190b04d0cb1b0c4ecf\" returns successfully" Apr 12 21:46:07.855325 kubelet[2173]: I0412 21:46:07.855240 2173 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:08.026000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.026000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000938000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:08.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:08.026000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.026000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005001a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:08.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:08.093000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.093000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b95800 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:46:08.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:46:08.093000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.093000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002b11320 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:46:08.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:46:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b95860 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:46:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:46:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004b03950 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:46:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:46:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c002304360 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:46:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:46:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0012ba360 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:46:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:46:08.107977 kubelet[2173]: I0412 21:46:08.107879 2173 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:08.165192 kubelet[2173]: E0412 21:46:08.165128 2173 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="1.6s" Apr 12 21:46:08.286058 kubelet[2173]: I0412 21:46:08.286002 2173 apiserver.go:52] "Watching apiserver" Apr 12 21:46:08.289312 kubelet[2173]: I0412 21:46:08.289268 2173 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 21:46:08.319889 kubelet[2173]: E0412 21:46:08.319805 2173 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:08.320061 kubelet[2173]: E0412 21:46:08.319925 2173 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:08.320061 kubelet[2173]: E0412 21:46:08.319977 2173 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-26e8ad9098\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:09.326102 kubelet[2173]: W0412 21:46:09.326048 2173 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:10.910000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:10.938190 kernel: kauditd_printk_skb: 575 callbacks suppressed Apr 12 21:46:10.938323 kernel: audit: type=1400 audit(1712958370.910:699): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:10.910000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000501000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:11.031076 systemd[1]: Reloading. Apr 12 21:46:11.067036 /usr/lib/systemd/system-generators/torcx-generator[2504]: time="2024-04-12T21:46:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:46:11.067061 /usr/lib/systemd/system-generators/torcx-generator[2504]: time="2024-04-12T21:46:11Z" level=info msg="torcx already run" Apr 12 21:46:11.143659 kernel: audit: type=1300 audit(1712958370.910:699): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000501000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:11.143770 kernel: audit: type=1327 audit(1712958370.910:699): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:11.143812 kernel: audit: type=1400 audit(1712958370.910:700): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:11.143852 kernel: audit: type=1300 audit(1712958370.910:700): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00110f3e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:11.143890 kernel: audit: type=1327 audit(1712958370.910:700): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:11.143929 kernel: audit: type=1400 audit(1712958370.910:701): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:10.910000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:10.910000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00110f3e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:10.910000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:10.910000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010472c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:10.911000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:10.911000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012139a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:10.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:11.625315 kernel: audit: type=1300 audit(1712958370.910:701): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010472c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:11.625350 kernel: audit: type=1327 audit(1712958370.910:701): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:11.625371 kernel: audit: type=1400 audit(1712958370.911:702): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:46:11.945343 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:46:11.945351 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:46:11.957647 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit: BPF prog-id=91 op=LOAD Apr 12 21:46:12.008000 audit: BPF prog-id=52 op=UNLOAD Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit: BPF prog-id=92 op=LOAD Apr 12 21:46:12.008000 audit: BPF prog-id=53 op=UNLOAD Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit: BPF prog-id=93 op=LOAD Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit: BPF prog-id=94 op=LOAD Apr 12 21:46:12.008000 audit: BPF prog-id=54 op=UNLOAD Apr 12 21:46:12.008000 audit: BPF prog-id=55 op=UNLOAD Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.008000 audit: BPF prog-id=95 op=LOAD Apr 12 21:46:12.008000 audit: BPF prog-id=79 op=UNLOAD Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit: BPF prog-id=96 op=LOAD Apr 12 21:46:12.009000 audit: BPF prog-id=56 op=UNLOAD Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.009000 audit: BPF prog-id=97 op=LOAD Apr 12 21:46:12.009000 audit: BPF prog-id=71 op=UNLOAD Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit: BPF prog-id=98 op=LOAD Apr 12 21:46:12.010000 audit: BPF prog-id=67 op=UNLOAD Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.010000 audit: BPF prog-id=99 op=LOAD Apr 12 21:46:12.010000 audit: BPF prog-id=83 op=UNLOAD Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.011000 audit: BPF prog-id=100 op=LOAD Apr 12 21:46:12.011000 audit: BPF prog-id=87 op=UNLOAD Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit: BPF prog-id=101 op=LOAD Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.012000 audit: BPF prog-id=102 op=LOAD Apr 12 21:46:12.012000 audit: BPF prog-id=57 op=UNLOAD Apr 12 21:46:12.012000 audit: BPF prog-id=58 op=UNLOAD Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit: BPF prog-id=103 op=LOAD Apr 12 21:46:12.013000 audit: BPF prog-id=59 op=UNLOAD Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit: BPF prog-id=104 op=LOAD Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit: BPF prog-id=105 op=LOAD Apr 12 21:46:12.013000 audit: BPF prog-id=60 op=UNLOAD Apr 12 21:46:12.013000 audit: BPF prog-id=61 op=UNLOAD Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit: BPF prog-id=106 op=LOAD Apr 12 21:46:12.014000 audit: BPF prog-id=62 op=UNLOAD Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit: BPF prog-id=107 op=LOAD Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit: BPF prog-id=108 op=LOAD Apr 12 21:46:12.014000 audit: BPF prog-id=63 op=UNLOAD Apr 12 21:46:12.014000 audit: BPF prog-id=64 op=UNLOAD Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.014000 audit: BPF prog-id=109 op=LOAD Apr 12 21:46:12.014000 audit: BPF prog-id=65 op=UNLOAD Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.015000 audit: BPF prog-id=110 op=LOAD Apr 12 21:46:12.015000 audit: BPF prog-id=66 op=UNLOAD Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.016000 audit: BPF prog-id=111 op=LOAD Apr 12 21:46:12.016000 audit: BPF prog-id=75 op=UNLOAD Apr 12 21:46:12.024318 systemd[1]: Stopping kubelet.service... Apr 12 21:46:12.049679 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 21:46:12.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:12.049784 systemd[1]: Stopped kubelet.service. Apr 12 21:46:12.050712 systemd[1]: Started kubelet.service. Apr 12 21:46:12.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:12.073953 kubelet[2565]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:46:12.073953 kubelet[2565]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 21:46:12.073953 kubelet[2565]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:46:12.074205 kubelet[2565]: I0412 21:46:12.073989 2565 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 21:46:12.076477 kubelet[2565]: I0412 21:46:12.076464 2565 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 21:46:12.076477 kubelet[2565]: I0412 21:46:12.076474 2565 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 21:46:12.076609 kubelet[2565]: I0412 21:46:12.076574 2565 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 21:46:12.077742 kubelet[2565]: I0412 21:46:12.077705 2565 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 21:46:12.078428 kubelet[2565]: I0412 21:46:12.078389 2565 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 21:46:12.097262 kubelet[2565]: I0412 21:46:12.097244 2565 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 21:46:12.097386 kubelet[2565]: I0412 21:46:12.097378 2565 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 21:46:12.097515 kubelet[2565]: I0412 21:46:12.097506 2565 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 21:46:12.097594 kubelet[2565]: I0412 21:46:12.097522 2565 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 21:46:12.097594 kubelet[2565]: I0412 21:46:12.097531 2565 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 21:46:12.097594 kubelet[2565]: I0412 21:46:12.097556 2565 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:46:12.097681 kubelet[2565]: I0412 21:46:12.097620 2565 kubelet.go:393] "Attempting to sync node with API server" Apr 12 21:46:12.097681 kubelet[2565]: I0412 21:46:12.097651 2565 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 21:46:12.097681 kubelet[2565]: I0412 21:46:12.097673 2565 kubelet.go:309] "Adding apiserver pod source" Apr 12 21:46:12.097764 kubelet[2565]: I0412 21:46:12.097689 2565 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 21:46:12.098110 kubelet[2565]: I0412 21:46:12.098093 2565 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 21:46:12.098473 kubelet[2565]: I0412 21:46:12.098465 2565 server.go:1232] "Started kubelet" Apr 12 21:46:12.098522 kubelet[2565]: I0412 21:46:12.098506 2565 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 21:46:12.098594 kubelet[2565]: I0412 21:46:12.098581 2565 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 21:46:12.098777 kubelet[2565]: E0412 21:46:12.098767 2565 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 21:46:12.098812 kubelet[2565]: E0412 21:46:12.098786 2565 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 21:46:12.098865 kubelet[2565]: I0412 21:46:12.098857 2565 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 21:46:12.098000 audit[2565]: AVC avc: denied { mac_admin } for pid=2565 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.098000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:46:12.098000 audit[2565]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c6ad50 a1=c000b08f00 a2=c000c6ad20 a3=25 items=0 ppid=1 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:12.098000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:46:12.098000 audit[2565]: AVC avc: denied { mac_admin } for pid=2565 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.098000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:46:12.098000 audit[2565]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f39a40 a1=c000b08f18 a2=c000c6ade0 a3=25 items=0 ppid=1 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:12.098000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:46:12.099671 kubelet[2565]: I0412 21:46:12.099394 2565 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 21:46:12.099671 kubelet[2565]: I0412 21:46:12.099410 2565 server.go:462] "Adding debug handlers to kubelet server" Apr 12 21:46:12.099671 kubelet[2565]: I0412 21:46:12.099422 2565 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 21:46:12.099671 kubelet[2565]: I0412 21:46:12.099440 2565 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 21:46:12.099671 kubelet[2565]: E0412 21:46:12.099532 2565 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-26e8ad9098\" not found" Apr 12 21:46:12.099671 kubelet[2565]: I0412 21:46:12.099537 2565 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 21:46:12.099671 kubelet[2565]: I0412 21:46:12.099562 2565 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 21:46:12.100054 kubelet[2565]: I0412 21:46:12.100042 2565 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 21:46:12.105145 kubelet[2565]: I0412 21:46:12.105127 2565 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 21:46:12.105766 kubelet[2565]: I0412 21:46:12.105756 2565 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 21:46:12.105815 kubelet[2565]: I0412 21:46:12.105773 2565 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 21:46:12.105815 kubelet[2565]: I0412 21:46:12.105785 2565 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 21:46:12.105867 kubelet[2565]: E0412 21:46:12.105814 2565 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 21:46:12.122140 kubelet[2565]: I0412 21:46:12.122123 2565 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 21:46:12.122140 kubelet[2565]: I0412 21:46:12.122136 2565 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 21:46:12.122140 kubelet[2565]: I0412 21:46:12.122146 2565 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:46:12.122315 kubelet[2565]: I0412 21:46:12.122247 2565 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 21:46:12.122315 kubelet[2565]: I0412 21:46:12.122263 2565 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 21:46:12.122315 kubelet[2565]: I0412 21:46:12.122267 2565 policy_none.go:49] "None policy: Start" Apr 12 21:46:12.122527 kubelet[2565]: I0412 21:46:12.122517 2565 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 21:46:12.122527 kubelet[2565]: I0412 21:46:12.122529 2565 state_mem.go:35] "Initializing new in-memory state store" Apr 12 21:46:12.122603 kubelet[2565]: I0412 21:46:12.122596 2565 state_mem.go:75] "Updated machine memory state" Apr 12 21:46:12.124278 kubelet[2565]: I0412 21:46:12.124269 2565 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 21:46:12.123000 audit[2565]: AVC avc: denied { mac_admin } for pid=2565 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:12.123000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:46:12.123000 audit[2565]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3e600 a1=c0014a1578 a2=c000b3e5d0 a3=25 items=0 ppid=1 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:12.123000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:46:12.124502 kubelet[2565]: I0412 21:46:12.124298 2565 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 21:46:12.124502 kubelet[2565]: I0412 21:46:12.124431 2565 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 21:46:12.201857 kubelet[2565]: I0412 21:46:12.201771 2565 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.206439 kubelet[2565]: I0412 21:46:12.206427 2565 topology_manager.go:215] "Topology Admit Handler" podUID="edbfafbd8240d276ee12588946ac8f02" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.206503 kubelet[2565]: I0412 21:46:12.206446 2565 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.206503 kubelet[2565]: I0412 21:46:12.206483 2565 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.206503 kubelet[2565]: I0412 21:46:12.206487 2565 topology_manager.go:215] "Topology Admit Handler" podUID="f0150c9cfba6fe282b50425a463d41b6" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.206587 kubelet[2565]: I0412 21:46:12.206513 2565 topology_manager.go:215] "Topology Admit Handler" podUID="60c72bb499f294ab36f6ab49767801d2" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.208867 kubelet[2565]: W0412 21:46:12.208857 2565 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:12.208867 kubelet[2565]: W0412 21:46:12.208868 2565 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:12.210370 kubelet[2565]: W0412 21:46:12.210337 2565 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:12.210370 kubelet[2565]: E0412 21:46:12.210364 2565 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301169 kubelet[2565]: I0412 21:46:12.301117 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/edbfafbd8240d276ee12588946ac8f02-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" (UID: \"edbfafbd8240d276ee12588946ac8f02\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301169 kubelet[2565]: I0412 21:46:12.301156 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301169 kubelet[2565]: I0412 21:46:12.301169 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301315 kubelet[2565]: I0412 21:46:12.301181 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301315 kubelet[2565]: I0412 21:46:12.301216 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301315 kubelet[2565]: I0412 21:46:12.301253 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/edbfafbd8240d276ee12588946ac8f02-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" (UID: \"edbfafbd8240d276ee12588946ac8f02\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301315 kubelet[2565]: I0412 21:46:12.301278 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/edbfafbd8240d276ee12588946ac8f02-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" (UID: \"edbfafbd8240d276ee12588946ac8f02\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301315 kubelet[2565]: I0412 21:46:12.301305 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f0150c9cfba6fe282b50425a463d41b6-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" (UID: \"f0150c9cfba6fe282b50425a463d41b6\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.301405 kubelet[2565]: I0412 21:46:12.301326 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/60c72bb499f294ab36f6ab49767801d2-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-26e8ad9098\" (UID: \"60c72bb499f294ab36f6ab49767801d2\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:12.374000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524922 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 21:46:12.374000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001126d80 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:46:12.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:46:13.098636 kubelet[2565]: I0412 21:46:13.098580 2565 apiserver.go:52] "Watching apiserver" Apr 12 21:46:13.100124 kubelet[2565]: I0412 21:46:13.100088 2565 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 21:46:13.120820 kubelet[2565]: W0412 21:46:13.120797 2565 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:13.120820 kubelet[2565]: W0412 21:46:13.120820 2565 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:13.120942 kubelet[2565]: E0412 21:46:13.120847 2565 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-26e8ad9098\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:13.120942 kubelet[2565]: W0412 21:46:13.120798 2565 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 21:46:13.120942 kubelet[2565]: E0412 21:46:13.120862 2565 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-26e8ad9098\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:13.120942 kubelet[2565]: E0412 21:46:13.120889 2565 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.3-a-26e8ad9098\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:13.130529 kubelet[2565]: I0412 21:46:13.130511 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-26e8ad9098" podStartSLOduration=1.13048568 podCreationTimestamp="2024-04-12 21:46:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:46:13.130412149 +0000 UTC m=+1.077719340" watchObservedRunningTime="2024-04-12 21:46:13.13048568 +0000 UTC m=+1.077792862" Apr 12 21:46:13.134711 kubelet[2565]: I0412 21:46:13.134696 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-26e8ad9098" podStartSLOduration=4.134677271 podCreationTimestamp="2024-04-12 21:46:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:46:13.134548098 +0000 UTC m=+1.081855283" watchObservedRunningTime="2024-04-12 21:46:13.134677271 +0000 UTC m=+1.081984453" Apr 12 21:46:13.138594 kubelet[2565]: I0412 21:46:13.138582 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-26e8ad9098" podStartSLOduration=1.138564916 podCreationTimestamp="2024-04-12 21:46:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:46:13.138367948 +0000 UTC m=+1.085675132" watchObservedRunningTime="2024-04-12 21:46:13.138564916 +0000 UTC m=+1.085872097" Apr 12 21:46:16.068381 sudo[1632]: pam_unix(sudo:session): session closed for user root Apr 12 21:46:16.067000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:46:16.069255 sshd[1629]: pam_unix(sshd:session): session closed for user core Apr 12 21:46:16.070951 systemd[1]: sshd@6-145.40.90.149:22-147.75.109.163:60662.service: Deactivated successfully. Apr 12 21:46:16.071357 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 21:46:16.071443 systemd[1]: session-9.scope: Consumed 2.978s CPU time. Apr 12 21:46:16.071717 systemd-logind[1462]: Session 9 logged out. Waiting for processes to exit. Apr 12 21:46:16.072135 systemd-logind[1462]: Removed session 9. Apr 12 21:46:16.094583 kernel: kauditd_printk_skb: 263 callbacks suppressed Apr 12 21:46:16.094625 kernel: audit: type=1106 audit(1712958376.067:953): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:46:16.067000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:46:16.267895 kernel: audit: type=1104 audit(1712958376.067:954): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:46:16.267923 kernel: audit: type=1106 audit(1712958376.069:955): pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:46:16.069000 audit[1629]: USER_END pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:46:16.361537 kernel: audit: type=1104 audit(1712958376.069:956): pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:46:16.069000 audit[1629]: CRED_DISP pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 21:46:16.449630 kernel: audit: type=1131 audit(1712958376.069:957): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-145.40.90.149:22-147.75.109.163:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:16.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-145.40.90.149:22-147.75.109.163:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:46:24.487846 kubelet[2565]: I0412 21:46:24.487782 2565 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 21:46:24.488899 env[1474]: time="2024-04-12T21:46:24.488797061Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 21:46:24.489554 kubelet[2565]: I0412 21:46:24.489316 2565 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 21:46:24.518746 kubelet[2565]: I0412 21:46:24.518625 2565 topology_manager.go:215] "Topology Admit Handler" podUID="02e5972a-0d54-4368-b176-1c250de7fdd3" podNamespace="kube-system" podName="kube-proxy-pfn8g" Apr 12 21:46:24.530748 systemd[1]: Created slice kubepods-besteffort-pod02e5972a_0d54_4368_b176_1c250de7fdd3.slice. Apr 12 21:46:24.583051 kubelet[2565]: I0412 21:46:24.582925 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/02e5972a-0d54-4368-b176-1c250de7fdd3-kube-proxy\") pod \"kube-proxy-pfn8g\" (UID: \"02e5972a-0d54-4368-b176-1c250de7fdd3\") " pod="kube-system/kube-proxy-pfn8g" Apr 12 21:46:24.583428 kubelet[2565]: I0412 21:46:24.583089 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/02e5972a-0d54-4368-b176-1c250de7fdd3-lib-modules\") pod \"kube-proxy-pfn8g\" (UID: \"02e5972a-0d54-4368-b176-1c250de7fdd3\") " pod="kube-system/kube-proxy-pfn8g" Apr 12 21:46:24.583428 kubelet[2565]: I0412 21:46:24.583268 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rd8fc\" (UniqueName: \"kubernetes.io/projected/02e5972a-0d54-4368-b176-1c250de7fdd3-kube-api-access-rd8fc\") pod \"kube-proxy-pfn8g\" (UID: \"02e5972a-0d54-4368-b176-1c250de7fdd3\") " pod="kube-system/kube-proxy-pfn8g" Apr 12 21:46:24.583735 kubelet[2565]: I0412 21:46:24.583443 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/02e5972a-0d54-4368-b176-1c250de7fdd3-xtables-lock\") pod \"kube-proxy-pfn8g\" (UID: \"02e5972a-0d54-4368-b176-1c250de7fdd3\") " pod="kube-system/kube-proxy-pfn8g" Apr 12 21:46:24.800225 kubelet[2565]: I0412 21:46:24.800139 2565 topology_manager.go:215] "Topology Admit Handler" podUID="e2ca6bcc-051d-40ed-8c7c-42a19e59c346" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-dwh2j" Apr 12 21:46:24.804870 systemd[1]: Created slice kubepods-besteffort-pode2ca6bcc_051d_40ed_8c7c_42a19e59c346.slice. Apr 12 21:46:24.849153 env[1474]: time="2024-04-12T21:46:24.849066476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pfn8g,Uid:02e5972a-0d54-4368-b176-1c250de7fdd3,Namespace:kube-system,Attempt:0,}" Apr 12 21:46:24.872090 env[1474]: time="2024-04-12T21:46:24.871904118Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:24.872090 env[1474]: time="2024-04-12T21:46:24.871997318Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:24.872090 env[1474]: time="2024-04-12T21:46:24.872035848Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:24.872714 env[1474]: time="2024-04-12T21:46:24.872432618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e37aebe0e7cf50d6eaef71d5e032b8d1b9490f10e991f531037233b82b7c7a67 pid=2728 runtime=io.containerd.runc.v2 Apr 12 21:46:24.885899 kubelet[2565]: I0412 21:46:24.885789 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e2ca6bcc-051d-40ed-8c7c-42a19e59c346-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-dwh2j\" (UID: \"e2ca6bcc-051d-40ed-8c7c-42a19e59c346\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-dwh2j" Apr 12 21:46:24.885899 kubelet[2565]: I0412 21:46:24.885904 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-strz4\" (UniqueName: \"kubernetes.io/projected/e2ca6bcc-051d-40ed-8c7c-42a19e59c346-kube-api-access-strz4\") pod \"tigera-operator-6bfc79cb9c-dwh2j\" (UID: \"e2ca6bcc-051d-40ed-8c7c-42a19e59c346\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-dwh2j" Apr 12 21:46:24.904788 systemd[1]: Started cri-containerd-e37aebe0e7cf50d6eaef71d5e032b8d1b9490f10e991f531037233b82b7c7a67.scope. Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.041137 kernel: audit: type=1400 audit(1712958384.912:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.041189 kernel: audit: type=1400 audit(1712958384.912:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.041207 kernel: audit: type=1400 audit(1712958384.912:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.104592 kernel: audit: type=1400 audit(1712958384.912:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.106993 env[1474]: time="2024-04-12T21:46:25.106970934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-dwh2j,Uid:e2ca6bcc-051d-40ed-8c7c-42a19e59c346,Namespace:tigera-operator,Attempt:0,}" Apr 12 21:46:25.112851 env[1474]: time="2024-04-12T21:46:25.112820472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:25.112851 env[1474]: time="2024-04-12T21:46:25.112842411Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:25.112932 env[1474]: time="2024-04-12T21:46:25.112853845Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:25.112932 env[1474]: time="2024-04-12T21:46:25.112913766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19763d4cd1de4355b7ec7f8b9840d70bf5e68bc77a70cbe0e2659657886ef8c1 pid=2760 runtime=io.containerd.runc.v2 Apr 12 21:46:25.118137 systemd[1]: Started cri-containerd-19763d4cd1de4355b7ec7f8b9840d70bf5e68bc77a70cbe0e2659657886ef8c1.scope. Apr 12 21:46:25.168466 kernel: audit: type=1400 audit(1712958384.912:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.232471 kernel: audit: type=1400 audit(1712958384.912:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.296414 kernel: audit: type=1400 audit(1712958384.912:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.360297 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:46:25.360333 kernel: audit: type=1400 audit(1712958384.912:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.387365 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 21:46:24.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.039000 audit: BPF prog-id=112 op=LOAD Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2728 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376165626530653763663530643665616566373164356530333262 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2728 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376165626530653763663530643665616566373164356530333262 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.040000 audit: BPF prog-id=113 op=LOAD Apr 12 21:46:25.040000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000310d50 items=0 ppid=2728 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376165626530653763663530643665616566373164356530333262 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.167000 audit: BPF prog-id=114 op=LOAD Apr 12 21:46:25.167000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001ddcd8 items=0 ppid=2728 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376165626530653763663530643665616566373164356530333262 Apr 12 21:46:25.295000 audit: BPF prog-id=114 op=UNLOAD Apr 12 21:46:25.295000 audit: BPF prog-id=113 op=UNLOAD Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit: BPF prog-id=115 op=LOAD Apr 12 21:46:25.295000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2760 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373633643463643164653433353562376563376638623938343064 Apr 12 21:46:25.295000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.295000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003900e8 items=0 ppid=2728 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533376165626530653763663530643665616566373164356530333262 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.477000 audit: BPF prog-id=117 op=LOAD Apr 12 21:46:25.477000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039efa0 items=0 ppid=2760 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373633643463643164653433353562376563376638623938343064 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit: BPF prog-id=118 op=LOAD Apr 12 21:46:25.478000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039efe8 items=0 ppid=2760 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373633643463643164653433353562376563376638623938343064 Apr 12 21:46:25.478000 audit: BPF prog-id=118 op=UNLOAD Apr 12 21:46:25.478000 audit: BPF prog-id=117 op=UNLOAD Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { perfmon } for pid=2770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit[2770]: AVC avc: denied { bpf } for pid=2770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.478000 audit: BPF prog-id=119 op=LOAD Apr 12 21:46:25.478000 audit[2770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039f3f8 items=0 ppid=2760 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373633643463643164653433353562376563376638623938343064 Apr 12 21:46:25.483685 env[1474]: time="2024-04-12T21:46:25.483657405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pfn8g,Uid:02e5972a-0d54-4368-b176-1c250de7fdd3,Namespace:kube-system,Attempt:0,} returns sandbox id \"e37aebe0e7cf50d6eaef71d5e032b8d1b9490f10e991f531037233b82b7c7a67\"" Apr 12 21:46:25.484866 env[1474]: time="2024-04-12T21:46:25.484849722Z" level=info msg="CreateContainer within sandbox \"e37aebe0e7cf50d6eaef71d5e032b8d1b9490f10e991f531037233b82b7c7a67\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 21:46:25.490142 env[1474]: time="2024-04-12T21:46:25.490099961Z" level=info msg="CreateContainer within sandbox \"e37aebe0e7cf50d6eaef71d5e032b8d1b9490f10e991f531037233b82b7c7a67\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4e0aedeecab5e7ada5c5fa091e64d75d228bb8473bf5615a19023a86d0858ab6\"" Apr 12 21:46:25.490374 env[1474]: time="2024-04-12T21:46:25.490357943Z" level=info msg="StartContainer for \"4e0aedeecab5e7ada5c5fa091e64d75d228bb8473bf5615a19023a86d0858ab6\"" Apr 12 21:46:25.495770 env[1474]: time="2024-04-12T21:46:25.495719369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-dwh2j,Uid:e2ca6bcc-051d-40ed-8c7c-42a19e59c346,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"19763d4cd1de4355b7ec7f8b9840d70bf5e68bc77a70cbe0e2659657886ef8c1\"" Apr 12 21:46:25.496568 env[1474]: time="2024-04-12T21:46:25.496555768Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 21:46:25.498133 systemd[1]: Started cri-containerd-4e0aedeecab5e7ada5c5fa091e64d75d228bb8473bf5615a19023a86d0858ab6.scope. Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcde90154d8 items=0 ppid=2728 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306165646565636162356537616461356335666130393165363464 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit: BPF prog-id=120 op=LOAD Apr 12 21:46:25.505000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000234f38 items=0 ppid=2728 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306165646565636162356537616461356335666130393165363464 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit: BPF prog-id=121 op=LOAD Apr 12 21:46:25.505000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000234f88 items=0 ppid=2728 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306165646565636162356537616461356335666130393165363464 Apr 12 21:46:25.505000 audit: BPF prog-id=121 op=UNLOAD Apr 12 21:46:25.505000 audit: BPF prog-id=120 op=UNLOAD Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:25.505000 audit: BPF prog-id=122 op=LOAD Apr 12 21:46:25.505000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000235018 items=0 ppid=2728 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306165646565636162356537616461356335666130393165363464 Apr 12 21:46:25.512158 env[1474]: time="2024-04-12T21:46:25.512135460Z" level=info msg="StartContainer for \"4e0aedeecab5e7ada5c5fa091e64d75d228bb8473bf5615a19023a86d0858ab6\" returns successfully" Apr 12 21:46:25.540000 audit[2869]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.540000 audit[2869]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2f045200 a2=0 a3=7ffe2f0451ec items=0 ppid=2819 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 21:46:25.540000 audit[2870]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.540000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff9e351b0 a2=0 a3=7ffff9e3519c items=0 ppid=2819 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 21:46:25.541000 audit[2871]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.541000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce8a3ecf0 a2=0 a3=7ffce8a3ecdc items=0 ppid=2819 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 21:46:25.541000 audit[2872]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.541000 audit[2872]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9aaabcb0 a2=0 a3=7ffd9aaabc9c items=0 ppid=2819 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 21:46:25.541000 audit[2873]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.541000 audit[2873]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff035ba60 a2=0 a3=7ffff035ba4c items=0 ppid=2819 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 21:46:25.541000 audit[2874]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.541000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc72c6f360 a2=0 a3=7ffc72c6f34c items=0 ppid=2819 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 21:46:25.642000 audit[2875]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.642000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcc5be0b70 a2=0 a3=7ffcc5be0b5c items=0 ppid=2819 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 21:46:25.644000 audit[2877]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.644000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa7d2f070 a2=0 a3=7fffa7d2f05c items=0 ppid=2819 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 21:46:25.647000 audit[2880]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.647000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcb6189d70 a2=0 a3=7ffcb6189d5c items=0 ppid=2819 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 21:46:25.648000 audit[2881]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.648000 audit[2881]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc100aa4c0 a2=0 a3=7ffc100aa4ac items=0 ppid=2819 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 21:46:25.649000 audit[2883]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.649000 audit[2883]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5f803b10 a2=0 a3=7ffe5f803afc items=0 ppid=2819 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 21:46:25.650000 audit[2884]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.650000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5a21f080 a2=0 a3=7fff5a21f06c items=0 ppid=2819 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 21:46:25.652000 audit[2886]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.652000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc25ec85e0 a2=0 a3=7ffc25ec85cc items=0 ppid=2819 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 21:46:25.655000 audit[2889]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.655000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd8d36cab0 a2=0 a3=7ffd8d36ca9c items=0 ppid=2819 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 21:46:25.656000 audit[2890]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.656000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0d9dabf0 a2=0 a3=7fff0d9dabdc items=0 ppid=2819 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 21:46:25.658000 audit[2892]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.658000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9b9b54b0 a2=0 a3=7ffc9b9b549c items=0 ppid=2819 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 21:46:25.659000 audit[2893]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.659000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe180ad0e0 a2=0 a3=7ffe180ad0cc items=0 ppid=2819 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 21:46:25.662000 audit[2895]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.662000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef8a86370 a2=0 a3=7ffef8a8635c items=0 ppid=2819 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:46:25.665000 audit[2898]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.665000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef7d3e8a0 a2=0 a3=7ffef7d3e88c items=0 ppid=2819 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:46:25.670000 audit[2901]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.670000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8edf9dc0 a2=0 a3=7ffe8edf9dac items=0 ppid=2819 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 21:46:25.671000 audit[2902]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.671000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd6c6ea3b0 a2=0 a3=7ffd6c6ea39c items=0 ppid=2819 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 21:46:25.675000 audit[2904]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.675000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc1ebd8b70 a2=0 a3=7ffc1ebd8b5c items=0 ppid=2819 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:46:25.680000 audit[2907]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.680000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2cd174f0 a2=0 a3=7fff2cd174dc items=0 ppid=2819 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:46:25.683000 audit[2908]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.683000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc85da4670 a2=0 a3=7ffc85da465c items=0 ppid=2819 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 21:46:25.689000 audit[2910]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:46:25.689000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe347df160 a2=0 a3=7ffe347df14c items=0 ppid=2819 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 21:46:25.726000 audit[2916]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:25.726000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffca0eb31d0 a2=0 a3=7ffca0eb31bc items=0 ppid=2819 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:25.730000 audit[2916]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:25.730000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffca0eb31d0 a2=0 a3=7ffca0eb31bc items=0 ppid=2819 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:25.738000 audit[2921]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.738000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc6a1f460 a2=0 a3=7fffc6a1f44c items=0 ppid=2819 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 21:46:25.740000 audit[2923]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.740000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb4697920 a2=0 a3=7ffeb469790c items=0 ppid=2819 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 21:46:25.742000 audit[2926]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.742000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee5712f50 a2=0 a3=7ffee5712f3c items=0 ppid=2819 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 21:46:25.742000 audit[2927]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.742000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc87bf7950 a2=0 a3=7ffc87bf793c items=0 ppid=2819 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 21:46:25.743000 audit[2929]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.743000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffddb8a9870 a2=0 a3=7ffddb8a985c items=0 ppid=2819 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 21:46:25.744000 audit[2930]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.744000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbbe3c5e0 a2=0 a3=7ffdbbe3c5cc items=0 ppid=2819 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 21:46:25.745000 audit[2932]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.745000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffffc867ce0 a2=0 a3=7ffffc867ccc items=0 ppid=2819 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 21:46:25.747000 audit[2935]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.747000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdfda06760 a2=0 a3=7ffdfda0674c items=0 ppid=2819 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.747000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 21:46:25.748000 audit[2936]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.748000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc052bb0c0 a2=0 a3=7ffc052bb0ac items=0 ppid=2819 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 21:46:25.749000 audit[2938]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.749000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd857f7e0 a2=0 a3=7fffd857f7cc items=0 ppid=2819 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 21:46:25.750000 audit[2939]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.750000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7104cfa0 a2=0 a3=7ffc7104cf8c items=0 ppid=2819 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 21:46:25.751000 audit[2941]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.751000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc90a75f70 a2=0 a3=7ffc90a75f5c items=0 ppid=2819 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:46:25.753000 audit[2944]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.753000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca221cc90 a2=0 a3=7ffca221cc7c items=0 ppid=2819 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 21:46:25.755000 audit[2947]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.755000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff632172f0 a2=0 a3=7fff632172dc items=0 ppid=2819 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 21:46:25.756000 audit[2948]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.756000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdfeb513b0 a2=0 a3=7ffdfeb5139c items=0 ppid=2819 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 21:46:25.757000 audit[2950]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.757000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd4dad54c0 a2=0 a3=7ffd4dad54ac items=0 ppid=2819 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:46:25.759000 audit[2953]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.759000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdb4c48030 a2=0 a3=7ffdb4c4801c items=0 ppid=2819 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:46:25.760000 audit[2954]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.760000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5b9d09c0 a2=0 a3=7ffc5b9d09ac items=0 ppid=2819 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 21:46:25.761000 audit[2956]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.761000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffccc207a90 a2=0 a3=7ffccc207a7c items=0 ppid=2819 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 21:46:25.762000 audit[2957]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.762000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1bbc2430 a2=0 a3=7ffe1bbc241c items=0 ppid=2819 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 21:46:25.763000 audit[2959]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.763000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9a4ef810 a2=0 a3=7ffe9a4ef7fc items=0 ppid=2819 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:46:25.766000 audit[2962]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:46:25.766000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe468ad9c0 a2=0 a3=7ffe468ad9ac items=0 ppid=2819 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:46:25.768000 audit[2964]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 21:46:25.768000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc7c2ccdd0 a2=0 a3=7ffc7c2ccdbc items=0 ppid=2819 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.768000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:25.768000 audit[2964]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 21:46:25.768000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc7c2ccdd0 a2=0 a3=7ffc7c2ccdbc items=0 ppid=2819 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:25.768000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:26.160674 kubelet[2565]: I0412 21:46:26.160610 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pfn8g" podStartSLOduration=2.160518639 podCreationTimestamp="2024-04-12 21:46:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:46:26.160338841 +0000 UTC m=+14.107646104" watchObservedRunningTime="2024-04-12 21:46:26.160518639 +0000 UTC m=+14.107825872" Apr 12 21:46:26.981695 update_engine[1464]: I0412 21:46:26.981577 1464 update_attempter.cc:509] Updating boot flags... Apr 12 21:46:27.023850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1176162434.mount: Deactivated successfully. Apr 12 21:46:28.124922 env[1474]: time="2024-04-12T21:46:28.124861021Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:28.125853 env[1474]: time="2024-04-12T21:46:28.125804041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:28.127020 env[1474]: time="2024-04-12T21:46:28.127005996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:28.128068 env[1474]: time="2024-04-12T21:46:28.128056027Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:28.128512 env[1474]: time="2024-04-12T21:46:28.128496111Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 21:46:28.129597 env[1474]: time="2024-04-12T21:46:28.129581666Z" level=info msg="CreateContainer within sandbox \"19763d4cd1de4355b7ec7f8b9840d70bf5e68bc77a70cbe0e2659657886ef8c1\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 21:46:28.134482 env[1474]: time="2024-04-12T21:46:28.134446117Z" level=info msg="CreateContainer within sandbox \"19763d4cd1de4355b7ec7f8b9840d70bf5e68bc77a70cbe0e2659657886ef8c1\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"deb19b115cbf9f74ef167e24f766198e393271189efb43412c6b462a5590a271\"" Apr 12 21:46:28.134801 env[1474]: time="2024-04-12T21:46:28.134748238Z" level=info msg="StartContainer for \"deb19b115cbf9f74ef167e24f766198e393271189efb43412c6b462a5590a271\"" Apr 12 21:46:28.144884 systemd[1]: Started cri-containerd-deb19b115cbf9f74ef167e24f766198e393271189efb43412c6b462a5590a271.scope. Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.148000 audit: BPF prog-id=123 op=LOAD Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2760 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:28.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623139623131356362663966373465663136376532346637363631 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2760 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:28.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623139623131356362663966373465663136376532346637363631 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit: BPF prog-id=124 op=LOAD Apr 12 21:46:28.149000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210c60 items=0 ppid=2760 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:28.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623139623131356362663966373465663136376532346637363631 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit: BPF prog-id=125 op=LOAD Apr 12 21:46:28.149000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000210ca8 items=0 ppid=2760 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:28.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623139623131356362663966373465663136376532346637363631 Apr 12 21:46:28.149000 audit: BPF prog-id=125 op=UNLOAD Apr 12 21:46:28.149000 audit: BPF prog-id=124 op=UNLOAD Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:28.149000 audit: BPF prog-id=126 op=LOAD Apr 12 21:46:28.149000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002110b8 items=0 ppid=2760 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:28.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623139623131356362663966373465663136376532346637363631 Apr 12 21:46:28.156280 env[1474]: time="2024-04-12T21:46:28.156222978Z" level=info msg="StartContainer for \"deb19b115cbf9f74ef167e24f766198e393271189efb43412c6b462a5590a271\" returns successfully" Apr 12 21:46:29.164635 kubelet[2565]: I0412 21:46:29.164616 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-dwh2j" podStartSLOduration=2.532253023 podCreationTimestamp="2024-04-12 21:46:24 +0000 UTC" firstStartedPulling="2024-04-12 21:46:25.496314864 +0000 UTC m=+13.443622045" lastFinishedPulling="2024-04-12 21:46:28.128655181 +0000 UTC m=+16.075962365" observedRunningTime="2024-04-12 21:46:29.164495131 +0000 UTC m=+17.111802316" watchObservedRunningTime="2024-04-12 21:46:29.164593343 +0000 UTC m=+17.111900525" Apr 12 21:46:29.843000 audit[3028]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:29.843000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdd90e60c0 a2=0 a3=7ffdd90e60ac items=0 ppid=2819 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:29.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:29.844000 audit[3028]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:29.844000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd90e60c0 a2=0 a3=0 items=0 ppid=2819 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:29.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:29.867000 audit[3030]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:29.867000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffee0d6230 a2=0 a3=7fffee0d621c items=0 ppid=2819 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:29.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:29.883000 audit[3030]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:29.883000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffee0d6230 a2=0 a3=0 items=0 ppid=2819 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:29.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:29.981299 kubelet[2565]: I0412 21:46:29.981208 2565 topology_manager.go:215] "Topology Admit Handler" podUID="66ad09b2-be9b-464f-b7e8-ab22becabff4" podNamespace="calico-system" podName="calico-typha-5864ffd8c-mv59k" Apr 12 21:46:29.989362 systemd[1]: Created slice kubepods-besteffort-pod66ad09b2_be9b_464f_b7e8_ab22becabff4.slice. Apr 12 21:46:30.008037 kubelet[2565]: I0412 21:46:30.008020 2565 topology_manager.go:215] "Topology Admit Handler" podUID="e83b5755-a9e7-4077-9fe6-3e9ff510d118" podNamespace="calico-system" podName="calico-node-slf2k" Apr 12 21:46:30.011925 systemd[1]: Created slice kubepods-besteffort-pode83b5755_a9e7_4077_9fe6_3e9ff510d118.slice. Apr 12 21:46:30.019637 kubelet[2565]: I0412 21:46:30.019620 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e83b5755-a9e7-4077-9fe6-3e9ff510d118-node-certs\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019637 kubelet[2565]: I0412 21:46:30.019647 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-var-run-calico\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019764 kubelet[2565]: I0412 21:46:30.019699 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/66ad09b2-be9b-464f-b7e8-ab22becabff4-typha-certs\") pod \"calico-typha-5864ffd8c-mv59k\" (UID: \"66ad09b2-be9b-464f-b7e8-ab22becabff4\") " pod="calico-system/calico-typha-5864ffd8c-mv59k" Apr 12 21:46:30.019764 kubelet[2565]: I0412 21:46:30.019717 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-lib-modules\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019764 kubelet[2565]: I0412 21:46:30.019729 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-xtables-lock\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019764 kubelet[2565]: I0412 21:46:30.019740 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-var-lib-calico\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019764 kubelet[2565]: I0412 21:46:30.019752 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-cni-net-dir\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019931 kubelet[2565]: I0412 21:46:30.019767 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-policysync\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019931 kubelet[2565]: I0412 21:46:30.019790 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/66ad09b2-be9b-464f-b7e8-ab22becabff4-tigera-ca-bundle\") pod \"calico-typha-5864ffd8c-mv59k\" (UID: \"66ad09b2-be9b-464f-b7e8-ab22becabff4\") " pod="calico-system/calico-typha-5864ffd8c-mv59k" Apr 12 21:46:30.019931 kubelet[2565]: I0412 21:46:30.019816 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g2nbz\" (UniqueName: \"kubernetes.io/projected/66ad09b2-be9b-464f-b7e8-ab22becabff4-kube-api-access-g2nbz\") pod \"calico-typha-5864ffd8c-mv59k\" (UID: \"66ad09b2-be9b-464f-b7e8-ab22becabff4\") " pod="calico-system/calico-typha-5864ffd8c-mv59k" Apr 12 21:46:30.019931 kubelet[2565]: I0412 21:46:30.019867 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e83b5755-a9e7-4077-9fe6-3e9ff510d118-tigera-ca-bundle\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.019931 kubelet[2565]: I0412 21:46:30.019888 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jlz2f\" (UniqueName: \"kubernetes.io/projected/e83b5755-a9e7-4077-9fe6-3e9ff510d118-kube-api-access-jlz2f\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.020104 kubelet[2565]: I0412 21:46:30.019922 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-cni-bin-dir\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.020104 kubelet[2565]: I0412 21:46:30.019947 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-cni-log-dir\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.020104 kubelet[2565]: I0412 21:46:30.020033 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e83b5755-a9e7-4077-9fe6-3e9ff510d118-flexvol-driver-host\") pod \"calico-node-slf2k\" (UID: \"e83b5755-a9e7-4077-9fe6-3e9ff510d118\") " pod="calico-system/calico-node-slf2k" Apr 12 21:46:30.122053 kubelet[2565]: E0412 21:46:30.121985 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.122053 kubelet[2565]: W0412 21:46:30.122043 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.122618 kubelet[2565]: E0412 21:46:30.122128 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.123386 kubelet[2565]: E0412 21:46:30.123329 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.123625 kubelet[2565]: W0412 21:46:30.123379 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.123625 kubelet[2565]: E0412 21:46:30.123488 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.124063 kubelet[2565]: E0412 21:46:30.124026 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.124063 kubelet[2565]: W0412 21:46:30.124058 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.124698 kubelet[2565]: E0412 21:46:30.124582 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.125540 kubelet[2565]: E0412 21:46:30.125476 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.125943 kubelet[2565]: W0412 21:46:30.125880 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.126972 kubelet[2565]: E0412 21:46:30.126925 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.127392 kubelet[2565]: W0412 21:46:30.127329 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.127787 kubelet[2565]: E0412 21:46:30.127720 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.128214 kubelet[2565]: E0412 21:46:30.127837 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.128606 kubelet[2565]: E0412 21:46:30.128546 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.128850 kubelet[2565]: W0412 21:46:30.128611 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.128850 kubelet[2565]: E0412 21:46:30.128693 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.130370 kubelet[2565]: E0412 21:46:30.130279 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.130370 kubelet[2565]: W0412 21:46:30.130331 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.130735 kubelet[2565]: E0412 21:46:30.130398 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.131029 kubelet[2565]: E0412 21:46:30.130971 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.131029 kubelet[2565]: W0412 21:46:30.131002 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.131339 kubelet[2565]: E0412 21:46:30.131049 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.131648 kubelet[2565]: E0412 21:46:30.131589 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.131648 kubelet[2565]: W0412 21:46:30.131641 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.132118 kubelet[2565]: E0412 21:46:30.131725 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.132445 kubelet[2565]: E0412 21:46:30.132398 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.132445 kubelet[2565]: W0412 21:46:30.132434 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.132899 kubelet[2565]: E0412 21:46:30.132510 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.133115 kubelet[2565]: E0412 21:46:30.133075 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.133115 kubelet[2565]: W0412 21:46:30.133102 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.133450 kubelet[2565]: E0412 21:46:30.133200 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.133703 kubelet[2565]: E0412 21:46:30.133657 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.133703 kubelet[2565]: W0412 21:46:30.133695 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.134017 kubelet[2565]: E0412 21:46:30.133795 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.134297 kubelet[2565]: E0412 21:46:30.134222 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.134496 kubelet[2565]: W0412 21:46:30.134302 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.134496 kubelet[2565]: E0412 21:46:30.134434 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.134855 kubelet[2565]: E0412 21:46:30.134821 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.135003 kubelet[2565]: W0412 21:46:30.134858 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.135003 kubelet[2565]: E0412 21:46:30.134926 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.135628 kubelet[2565]: E0412 21:46:30.135588 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.135792 kubelet[2565]: W0412 21:46:30.135628 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.135792 kubelet[2565]: E0412 21:46:30.135681 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.136430 kubelet[2565]: E0412 21:46:30.136383 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.136430 kubelet[2565]: W0412 21:46:30.136422 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.136908 kubelet[2565]: E0412 21:46:30.136487 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.137205 kubelet[2565]: E0412 21:46:30.137095 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.137205 kubelet[2565]: W0412 21:46:30.137126 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.137205 kubelet[2565]: E0412 21:46:30.137178 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.140333 kubelet[2565]: E0412 21:46:30.140298 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.140333 kubelet[2565]: W0412 21:46:30.140323 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.140672 kubelet[2565]: E0412 21:46:30.140355 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.140897 kubelet[2565]: I0412 21:46:30.140863 2565 topology_manager.go:215] "Topology Admit Handler" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" podNamespace="calico-system" podName="csi-node-driver-bnhfc" Apr 12 21:46:30.141541 kubelet[2565]: E0412 21:46:30.141506 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:30.145995 kubelet[2565]: E0412 21:46:30.145967 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.145995 kubelet[2565]: W0412 21:46:30.145989 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.146214 kubelet[2565]: E0412 21:46:30.146029 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.150995 kubelet[2565]: E0412 21:46:30.150970 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.150995 kubelet[2565]: W0412 21:46:30.150991 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.151220 kubelet[2565]: E0412 21:46:30.151021 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.217378 kubelet[2565]: E0412 21:46:30.217320 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.217378 kubelet[2565]: W0412 21:46:30.217370 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.218657 kubelet[2565]: E0412 21:46:30.217442 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.218657 kubelet[2565]: E0412 21:46:30.218057 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.218657 kubelet[2565]: W0412 21:46:30.218091 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.218657 kubelet[2565]: E0412 21:46:30.218146 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.219385 kubelet[2565]: E0412 21:46:30.218754 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.219385 kubelet[2565]: W0412 21:46:30.218785 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.219385 kubelet[2565]: E0412 21:46:30.218833 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.219854 kubelet[2565]: E0412 21:46:30.219440 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.219854 kubelet[2565]: W0412 21:46:30.219471 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.219854 kubelet[2565]: E0412 21:46:30.219518 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.220401 kubelet[2565]: E0412 21:46:30.220194 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.220401 kubelet[2565]: W0412 21:46:30.220220 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.220401 kubelet[2565]: E0412 21:46:30.220283 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.220781 kubelet[2565]: E0412 21:46:30.220752 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.220781 kubelet[2565]: W0412 21:46:30.220776 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.220967 kubelet[2565]: E0412 21:46:30.220806 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.221190 kubelet[2565]: E0412 21:46:30.221166 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.221190 kubelet[2565]: W0412 21:46:30.221186 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.221400 kubelet[2565]: E0412 21:46:30.221213 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.221585 kubelet[2565]: E0412 21:46:30.221555 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.221585 kubelet[2565]: W0412 21:46:30.221574 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.221876 kubelet[2565]: E0412 21:46:30.221598 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.222005 kubelet[2565]: E0412 21:46:30.221967 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.222005 kubelet[2565]: W0412 21:46:30.221993 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.222198 kubelet[2565]: E0412 21:46:30.222025 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.222491 kubelet[2565]: E0412 21:46:30.222426 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.222491 kubelet[2565]: W0412 21:46:30.222451 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.222491 kubelet[2565]: E0412 21:46:30.222480 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.222918 kubelet[2565]: E0412 21:46:30.222892 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.222918 kubelet[2565]: W0412 21:46:30.222916 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.223084 kubelet[2565]: E0412 21:46:30.222942 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.223307 kubelet[2565]: E0412 21:46:30.223286 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.223307 kubelet[2565]: W0412 21:46:30.223304 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.223494 kubelet[2565]: E0412 21:46:30.223339 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.223682 kubelet[2565]: E0412 21:46:30.223657 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.223772 kubelet[2565]: W0412 21:46:30.223683 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.223772 kubelet[2565]: E0412 21:46:30.223713 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.224161 kubelet[2565]: E0412 21:46:30.224139 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.224161 kubelet[2565]: W0412 21:46:30.224158 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.224384 kubelet[2565]: E0412 21:46:30.224184 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.224633 kubelet[2565]: E0412 21:46:30.224599 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.224633 kubelet[2565]: W0412 21:46:30.224624 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.224893 kubelet[2565]: E0412 21:46:30.224653 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.225010 kubelet[2565]: E0412 21:46:30.224992 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.225081 kubelet[2565]: W0412 21:46:30.225013 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.225081 kubelet[2565]: E0412 21:46:30.225044 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.225318 kubelet[2565]: E0412 21:46:30.225302 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.225318 kubelet[2565]: W0412 21:46:30.225317 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.225449 kubelet[2565]: E0412 21:46:30.225340 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.225651 kubelet[2565]: E0412 21:46:30.225613 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.225651 kubelet[2565]: W0412 21:46:30.225626 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.225651 kubelet[2565]: E0412 21:46:30.225644 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.225920 kubelet[2565]: E0412 21:46:30.225905 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.225920 kubelet[2565]: W0412 21:46:30.225919 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.226029 kubelet[2565]: E0412 21:46:30.225938 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.226179 kubelet[2565]: E0412 21:46:30.226166 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.226179 kubelet[2565]: W0412 21:46:30.226178 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.226315 kubelet[2565]: E0412 21:46:30.226194 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.226513 kubelet[2565]: E0412 21:46:30.226459 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.226513 kubelet[2565]: W0412 21:46:30.226477 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.226513 kubelet[2565]: E0412 21:46:30.226499 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.226775 kubelet[2565]: E0412 21:46:30.226760 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.226846 kubelet[2565]: W0412 21:46:30.226781 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.226846 kubelet[2565]: E0412 21:46:30.226800 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.227074 kubelet[2565]: E0412 21:46:30.227061 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.227074 kubelet[2565]: W0412 21:46:30.227073 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.227181 kubelet[2565]: E0412 21:46:30.227090 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.227362 kubelet[2565]: E0412 21:46:30.227314 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.227362 kubelet[2565]: W0412 21:46:30.227327 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.227362 kubelet[2565]: E0412 21:46:30.227345 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.227614 kubelet[2565]: E0412 21:46:30.227599 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.227614 kubelet[2565]: W0412 21:46:30.227612 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.227732 kubelet[2565]: E0412 21:46:30.227630 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.227878 kubelet[2565]: E0412 21:46:30.227864 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.227878 kubelet[2565]: W0412 21:46:30.227876 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.228003 kubelet[2565]: E0412 21:46:30.227893 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.228134 kubelet[2565]: E0412 21:46:30.228121 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.228134 kubelet[2565]: W0412 21:46:30.228133 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.228275 kubelet[2565]: E0412 21:46:30.228149 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.228446 kubelet[2565]: E0412 21:46:30.228402 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.228446 kubelet[2565]: W0412 21:46:30.228419 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.228446 kubelet[2565]: E0412 21:46:30.228442 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.228755 kubelet[2565]: E0412 21:46:30.228739 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.228755 kubelet[2565]: W0412 21:46:30.228754 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.228886 kubelet[2565]: E0412 21:46:30.228772 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.229004 kubelet[2565]: E0412 21:46:30.228991 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.229004 kubelet[2565]: W0412 21:46:30.229002 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.229134 kubelet[2565]: E0412 21:46:30.229020 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.231389 kubelet[2565]: E0412 21:46:30.231343 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.231389 kubelet[2565]: W0412 21:46:30.231360 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.231389 kubelet[2565]: E0412 21:46:30.231386 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.231577 kubelet[2565]: I0412 21:46:30.231425 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/589877c5-c6c3-4951-9e7e-7b8f65a7589c-varrun\") pod \"csi-node-driver-bnhfc\" (UID: \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\") " pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:30.231715 kubelet[2565]: E0412 21:46:30.231676 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.231715 kubelet[2565]: W0412 21:46:30.231697 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.231814 kubelet[2565]: E0412 21:46:30.231729 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.232015 kubelet[2565]: E0412 21:46:30.231980 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.232015 kubelet[2565]: W0412 21:46:30.231995 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.232115 kubelet[2565]: E0412 21:46:30.232024 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.232115 kubelet[2565]: I0412 21:46:30.232068 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/589877c5-c6c3-4951-9e7e-7b8f65a7589c-kubelet-dir\") pod \"csi-node-driver-bnhfc\" (UID: \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\") " pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:30.232271 kubelet[2565]: E0412 21:46:30.232256 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.232271 kubelet[2565]: W0412 21:46:30.232270 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.232393 kubelet[2565]: E0412 21:46:30.232293 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.232543 kubelet[2565]: E0412 21:46:30.232527 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.232616 kubelet[2565]: W0412 21:46:30.232544 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.232616 kubelet[2565]: E0412 21:46:30.232572 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.232803 kubelet[2565]: E0412 21:46:30.232787 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.232879 kubelet[2565]: W0412 21:46:30.232803 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.232879 kubelet[2565]: E0412 21:46:30.232830 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.232879 kubelet[2565]: I0412 21:46:30.232876 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qf9wz\" (UniqueName: \"kubernetes.io/projected/589877c5-c6c3-4951-9e7e-7b8f65a7589c-kube-api-access-qf9wz\") pod \"csi-node-driver-bnhfc\" (UID: \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\") " pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:30.233090 kubelet[2565]: E0412 21:46:30.233075 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.233143 kubelet[2565]: W0412 21:46:30.233091 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.233143 kubelet[2565]: E0412 21:46:30.233114 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.233347 kubelet[2565]: E0412 21:46:30.233334 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.233400 kubelet[2565]: W0412 21:46:30.233348 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.233400 kubelet[2565]: E0412 21:46:30.233366 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.233633 kubelet[2565]: E0412 21:46:30.233584 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.233633 kubelet[2565]: W0412 21:46:30.233601 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.233633 kubelet[2565]: E0412 21:46:30.233622 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.233837 kubelet[2565]: E0412 21:46:30.233822 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.233893 kubelet[2565]: W0412 21:46:30.233836 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.233893 kubelet[2565]: E0412 21:46:30.233857 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.234110 kubelet[2565]: E0412 21:46:30.234078 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.234110 kubelet[2565]: W0412 21:46:30.234088 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.234110 kubelet[2565]: E0412 21:46:30.234105 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.234357 kubelet[2565]: E0412 21:46:30.234339 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.234443 kubelet[2565]: W0412 21:46:30.234357 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.234443 kubelet[2565]: E0412 21:46:30.234381 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.234620 kubelet[2565]: E0412 21:46:30.234579 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.234620 kubelet[2565]: W0412 21:46:30.234588 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.234620 kubelet[2565]: E0412 21:46:30.234605 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.234790 kubelet[2565]: E0412 21:46:30.234778 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.234790 kubelet[2565]: W0412 21:46:30.234788 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.234886 kubelet[2565]: E0412 21:46:30.234810 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.235011 kubelet[2565]: E0412 21:46:30.235001 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.235011 kubelet[2565]: W0412 21:46:30.235010 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.235100 kubelet[2565]: E0412 21:46:30.235026 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.235193 kubelet[2565]: E0412 21:46:30.235183 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.235255 kubelet[2565]: W0412 21:46:30.235193 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.235255 kubelet[2565]: E0412 21:46:30.235206 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.235255 kubelet[2565]: I0412 21:46:30.235242 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/589877c5-c6c3-4951-9e7e-7b8f65a7589c-registration-dir\") pod \"csi-node-driver-bnhfc\" (UID: \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\") " pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:30.235499 kubelet[2565]: E0412 21:46:30.235486 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.235553 kubelet[2565]: W0412 21:46:30.235500 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.235553 kubelet[2565]: E0412 21:46:30.235522 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.235725 kubelet[2565]: E0412 21:46:30.235689 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.235725 kubelet[2565]: W0412 21:46:30.235699 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.235725 kubelet[2565]: E0412 21:46:30.235715 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.235896 kubelet[2565]: E0412 21:46:30.235885 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.235896 kubelet[2565]: W0412 21:46:30.235895 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.235989 kubelet[2565]: E0412 21:46:30.235909 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.235989 kubelet[2565]: I0412 21:46:30.235935 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/589877c5-c6c3-4951-9e7e-7b8f65a7589c-socket-dir\") pod \"csi-node-driver-bnhfc\" (UID: \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\") " pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:30.236138 kubelet[2565]: E0412 21:46:30.236127 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.236187 kubelet[2565]: W0412 21:46:30.236138 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.236187 kubelet[2565]: E0412 21:46:30.236153 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.236363 kubelet[2565]: E0412 21:46:30.236349 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.236411 kubelet[2565]: W0412 21:46:30.236363 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.236411 kubelet[2565]: E0412 21:46:30.236381 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.293154 env[1474]: time="2024-04-12T21:46:30.293102074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5864ffd8c-mv59k,Uid:66ad09b2-be9b-464f-b7e8-ab22becabff4,Namespace:calico-system,Attempt:0,}" Apr 12 21:46:30.309335 env[1474]: time="2024-04-12T21:46:30.309243098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:30.309335 env[1474]: time="2024-04-12T21:46:30.309302120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:30.309597 env[1474]: time="2024-04-12T21:46:30.309333142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:30.309689 env[1474]: time="2024-04-12T21:46:30.309566172Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af42c6fa777c17a3ca87bbd0977c685e38369a2a2f2c3f5331db0e56bb225d1e pid=3114 runtime=io.containerd.runc.v2 Apr 12 21:46:30.314037 env[1474]: time="2024-04-12T21:46:30.313989578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-slf2k,Uid:e83b5755-a9e7-4077-9fe6-3e9ff510d118,Namespace:calico-system,Attempt:0,}" Apr 12 21:46:30.324412 systemd[1]: Started cri-containerd-af42c6fa777c17a3ca87bbd0977c685e38369a2a2f2c3f5331db0e56bb225d1e.scope. Apr 12 21:46:30.326988 env[1474]: time="2024-04-12T21:46:30.326874324Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:30.326988 env[1474]: time="2024-04-12T21:46:30.326940170Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:30.327188 env[1474]: time="2024-04-12T21:46:30.326970742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:30.327314 env[1474]: time="2024-04-12T21:46:30.327256589Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b pid=3141 runtime=io.containerd.runc.v2 Apr 12 21:46:30.343262 kubelet[2565]: E0412 21:46:30.337510 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.343262 kubelet[2565]: W0412 21:46:30.337555 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.343262 kubelet[2565]: E0412 21:46:30.337595 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.343262 kubelet[2565]: E0412 21:46:30.339479 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.343262 kubelet[2565]: W0412 21:46:30.339499 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.343262 kubelet[2565]: E0412 21:46:30.339539 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.347441 kubelet[2565]: E0412 21:46:30.346855 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.347441 kubelet[2565]: W0412 21:46:30.346879 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.347441 kubelet[2565]: E0412 21:46:30.346923 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.347441 kubelet[2565]: E0412 21:46:30.347286 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.347441 kubelet[2565]: W0412 21:46:30.347303 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.347441 kubelet[2565]: E0412 21:46:30.347435 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.348097 kubelet[2565]: E0412 21:46:30.348076 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.348097 kubelet[2565]: W0412 21:46:30.348093 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.348215 kubelet[2565]: E0412 21:46:30.348141 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.348361 kubelet[2565]: E0412 21:46:30.348344 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.348435 kubelet[2565]: W0412 21:46:30.348361 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.348491 kubelet[2565]: E0412 21:46:30.348453 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.348593 kubelet[2565]: E0412 21:46:30.348579 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.348663 kubelet[2565]: W0412 21:46:30.348594 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.348663 kubelet[2565]: E0412 21:46:30.348632 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.348817 kubelet[2565]: E0412 21:46:30.348803 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.348869 kubelet[2565]: W0412 21:46:30.348819 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.348869 kubelet[2565]: E0412 21:46:30.348853 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349052 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350526 kubelet[2565]: W0412 21:46:30.349066 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349102 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349275 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350526 kubelet[2565]: W0412 21:46:30.349287 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349313 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349544 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350526 kubelet[2565]: W0412 21:46:30.349556 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349660 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350526 kubelet[2565]: E0412 21:46:30.349835 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350889 kubelet[2565]: W0412 21:46:30.349846 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.350889 kubelet[2565]: E0412 21:46:30.349928 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350889 kubelet[2565]: E0412 21:46:30.349994 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350889 kubelet[2565]: W0412 21:46:30.350003 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.350889 kubelet[2565]: E0412 21:46:30.350099 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350889 kubelet[2565]: E0412 21:46:30.350163 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350889 kubelet[2565]: W0412 21:46:30.350174 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.350889 kubelet[2565]: E0412 21:46:30.350273 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.350889 kubelet[2565]: E0412 21:46:30.350467 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.350889 kubelet[2565]: W0412 21:46:30.350477 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.350514 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.350667 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351241 kubelet[2565]: W0412 21:46:30.350674 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.350689 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.350855 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351241 kubelet[2565]: W0412 21:46:30.350863 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.350877 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.351037 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351241 kubelet[2565]: W0412 21:46:30.351047 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351241 kubelet[2565]: E0412 21:46:30.351065 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351582 kubelet[2565]: E0412 21:46:30.351179 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351582 kubelet[2565]: W0412 21:46:30.351185 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351582 kubelet[2565]: E0412 21:46:30.351196 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351582 kubelet[2565]: E0412 21:46:30.351340 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351582 kubelet[2565]: W0412 21:46:30.351346 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351582 kubelet[2565]: E0412 21:46:30.351357 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351582 kubelet[2565]: E0412 21:46:30.351565 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351582 kubelet[2565]: W0412 21:46:30.351577 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351862 kubelet[2565]: E0412 21:46:30.351598 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.351862 kubelet[2565]: E0412 21:46:30.351745 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.351862 kubelet[2565]: W0412 21:46:30.351755 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.351862 kubelet[2565]: E0412 21:46:30.351786 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.352003 kubelet[2565]: E0412 21:46:30.351897 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.352003 kubelet[2565]: W0412 21:46:30.351907 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.352003 kubelet[2565]: E0412 21:46:30.351926 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.352134 kubelet[2565]: E0412 21:46:30.352122 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.352175 kubelet[2565]: W0412 21:46:30.352133 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.352175 kubelet[2565]: E0412 21:46:30.352152 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.352365 kubelet[2565]: E0412 21:46:30.352354 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.352419 kubelet[2565]: W0412 21:46:30.352365 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.352419 kubelet[2565]: E0412 21:46:30.352381 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.352921 systemd[1]: Started cri-containerd-e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b.scope. Apr 12 21:46:30.358345 kubelet[2565]: E0412 21:46:30.358329 2565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:46:30.358345 kubelet[2565]: W0412 21:46:30.358344 2565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:46:30.358463 kubelet[2565]: E0412 21:46:30.358358 2565 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:46:30.371696 kernel: kauditd_printk_skb: 371 callbacks suppressed Apr 12 21:46:30.371747 kernel: audit: type=1400 audit(1712958390.343:1072): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.435277 kernel: audit: type=1400 audit(1712958390.343:1073): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.498236 kernel: audit: type=1400 audit(1712958390.343:1074): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.498271 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.560278 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:46:30.560302 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 21:46:30.560316 kernel: audit: backlog limit exceeded Apr 12 21:46:30.560336 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:46:30.560348 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 21:46:30.560358 kernel: audit: backlog limit exceeded Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.343000 audit: BPF prog-id=127 op=LOAD Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343263366661373737633137613363613837626264303937376336 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343263366661373737633137613363613837626264303937376336 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.344000 audit: BPF prog-id=128 op=LOAD Apr 12 21:46:30.344000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc9d0 items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343263366661373737633137613363613837626264303937376336 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit: BPF prog-id=129 op=LOAD Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3141 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623039386564356562343939326535633938653661333434313865 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3141 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623039386564356562343939326535633938653661333434313865 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dca18 items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343263366661373737633137613363613837626264303937376336 Apr 12 21:46:30.558000 audit: BPF prog-id=130 op=UNLOAD Apr 12 21:46:30.558000 audit: BPF prog-id=128 op=UNLOAD Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.559000 audit: BPF prog-id=131 op=LOAD Apr 12 21:46:30.559000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dce28 items=0 ppid=3114 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343263366661373737633137613363613837626264303937376336 Apr 12 21:46:30.496000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.496000 audit: BPF prog-id=132 op=LOAD Apr 12 21:46:30.496000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000326ad0 items=0 ppid=3141 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623039386564356562343939326535633938653661333434313865 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit: BPF prog-id=133 op=LOAD Apr 12 21:46:30.738000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000326b18 items=0 ppid=3141 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623039386564356562343939326535633938653661333434313865 Apr 12 21:46:30.738000 audit: BPF prog-id=133 op=UNLOAD Apr 12 21:46:30.738000 audit: BPF prog-id=132 op=UNLOAD Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:30.738000 audit: BPF prog-id=134 op=LOAD Apr 12 21:46:30.738000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000326f28 items=0 ppid=3141 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537623039386564356562343939326535633938653661333434313865 Apr 12 21:46:30.744528 env[1474]: time="2024-04-12T21:46:30.744500105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-slf2k,Uid:e83b5755-a9e7-4077-9fe6-3e9ff510d118,Namespace:calico-system,Attempt:0,} returns sandbox id \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\"" Apr 12 21:46:30.745292 env[1474]: time="2024-04-12T21:46:30.745278261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 21:46:30.756980 env[1474]: time="2024-04-12T21:46:30.756931823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5864ffd8c-mv59k,Uid:66ad09b2-be9b-464f-b7e8-ab22becabff4,Namespace:calico-system,Attempt:0,} returns sandbox id \"af42c6fa777c17a3ca87bbd0977c685e38369a2a2f2c3f5331db0e56bb225d1e\"" Apr 12 21:46:30.909000 audit[3214]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:30.909000 audit[3214]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe5e80f3f0 a2=0 a3=7ffe5e80f3dc items=0 ppid=2819 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:30.910000 audit[3214]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:30.910000 audit[3214]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5e80f3f0 a2=0 a3=0 items=0 ppid=2819 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:30.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:32.107282 kubelet[2565]: E0412 21:46:32.107132 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:32.205316 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2583627704.mount: Deactivated successfully. Apr 12 21:46:34.084143 env[1474]: time="2024-04-12T21:46:34.084115978Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:34.084721 env[1474]: time="2024-04-12T21:46:34.084709164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:34.085757 env[1474]: time="2024-04-12T21:46:34.085744963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:34.087209 env[1474]: time="2024-04-12T21:46:34.087196172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:34.087625 env[1474]: time="2024-04-12T21:46:34.087609474Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 21:46:34.087868 env[1474]: time="2024-04-12T21:46:34.087855909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 21:46:34.088622 env[1474]: time="2024-04-12T21:46:34.088607991Z" level=info msg="CreateContainer within sandbox \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 21:46:34.093215 env[1474]: time="2024-04-12T21:46:34.093199926Z" level=info msg="CreateContainer within sandbox \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a\"" Apr 12 21:46:34.093401 env[1474]: time="2024-04-12T21:46:34.093387631Z" level=info msg="StartContainer for \"62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a\"" Apr 12 21:46:34.102094 systemd[1]: Started cri-containerd-62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a.scope. Apr 12 21:46:34.106468 kubelet[2565]: E0412 21:46:34.106421 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f0e80830ea8 items=0 ppid=3141 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:34.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616264316165356139626331636532373730666162306433383562 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit: BPF prog-id=135 op=LOAD Apr 12 21:46:34.107000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00023a858 items=0 ppid=3141 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:34.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616264316165356139626331636532373730666162306433383562 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit: BPF prog-id=136 op=LOAD Apr 12 21:46:34.107000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00023a8a8 items=0 ppid=3141 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:34.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616264316165356139626331636532373730666162306433383562 Apr 12 21:46:34.107000 audit: BPF prog-id=136 op=UNLOAD Apr 12 21:46:34.107000 audit: BPF prog-id=135 op=UNLOAD Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { perfmon } for pid=3222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit[3222]: AVC avc: denied { bpf } for pid=3222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:34.107000 audit: BPF prog-id=137 op=LOAD Apr 12 21:46:34.107000 audit[3222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00023a938 items=0 ppid=3141 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:34.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632616264316165356139626331636532373730666162306433383562 Apr 12 21:46:34.114838 env[1474]: time="2024-04-12T21:46:34.114792690Z" level=info msg="StartContainer for \"62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a\" returns successfully" Apr 12 21:46:34.120127 systemd[1]: cri-containerd-62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a.scope: Deactivated successfully. Apr 12 21:46:34.130238 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a-rootfs.mount: Deactivated successfully. Apr 12 21:46:34.129000 audit: BPF prog-id=137 op=UNLOAD Apr 12 21:46:34.363203 env[1474]: time="2024-04-12T21:46:34.363092122Z" level=info msg="shim disconnected" id=62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a Apr 12 21:46:34.363636 env[1474]: time="2024-04-12T21:46:34.363207317Z" level=warning msg="cleaning up after shim disconnected" id=62abd1ae5a9bc1ce2770fab0d385b9df9f9625bd316b38ebb13b24d9e3cda74a namespace=k8s.io Apr 12 21:46:34.363636 env[1474]: time="2024-04-12T21:46:34.363265483Z" level=info msg="cleaning up dead shim" Apr 12 21:46:34.379762 env[1474]: time="2024-04-12T21:46:34.379679328Z" level=warning msg="cleanup warnings time=\"2024-04-12T21:46:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3266 runtime=io.containerd.runc.v2\n" Apr 12 21:46:35.463692 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1829184784.mount: Deactivated successfully. Apr 12 21:46:36.106975 kubelet[2565]: E0412 21:46:36.106862 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:37.336963 env[1474]: time="2024-04-12T21:46:37.336920025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:37.337478 env[1474]: time="2024-04-12T21:46:37.337467577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:37.338750 env[1474]: time="2024-04-12T21:46:37.338708259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:37.339639 env[1474]: time="2024-04-12T21:46:37.339591786Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:37.340099 env[1474]: time="2024-04-12T21:46:37.340046891Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 21:46:37.340306 env[1474]: time="2024-04-12T21:46:37.340294873Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 21:46:37.344086 env[1474]: time="2024-04-12T21:46:37.344069734Z" level=info msg="CreateContainer within sandbox \"af42c6fa777c17a3ca87bbd0977c685e38369a2a2f2c3f5331db0e56bb225d1e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 21:46:37.348056 env[1474]: time="2024-04-12T21:46:37.348041096Z" level=info msg="CreateContainer within sandbox \"af42c6fa777c17a3ca87bbd0977c685e38369a2a2f2c3f5331db0e56bb225d1e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e966b9a07e389e041d9c6683b09bd80d26d9b17a9b96b3199afb8d2fb0082928\"" Apr 12 21:46:37.348354 env[1474]: time="2024-04-12T21:46:37.348325610Z" level=info msg="StartContainer for \"e966b9a07e389e041d9c6683b09bd80d26d9b17a9b96b3199afb8d2fb0082928\"" Apr 12 21:46:37.357139 systemd[1]: Started cri-containerd-e966b9a07e389e041d9c6683b09bd80d26d9b17a9b96b3199afb8d2fb0082928.scope. Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.388640 kernel: kauditd_printk_skb: 160 callbacks suppressed Apr 12 21:46:37.388721 kernel: audit: type=1400 audit(1712958397.362:1117): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.507624 kernel: audit: type=1400 audit(1712958397.362:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.507666 kernel: audit: type=1400 audit(1712958397.362:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.566593 kernel: audit: type=1400 audit(1712958397.362:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.626074 kernel: audit: type=1400 audit(1712958397.362:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.685407 kernel: audit: type=1400 audit(1712958397.362:1122): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.744822 kernel: audit: type=1400 audit(1712958397.362:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.804256 kernel: audit: type=1400 audit(1712958397.362:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.863764 kernel: audit: type=1400 audit(1712958397.362:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.922916 kernel: audit: type=1400 audit(1712958397.447:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit: BPF prog-id=138 op=LOAD Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3114 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:37.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363662396130376533383965303431643963363638336230396264 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3114 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:37.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363662396130376533383965303431643963363638336230396264 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.447000 audit: BPF prog-id=139 op=LOAD Apr 12 21:46:37.447000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025da30 items=0 ppid=3114 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:37.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363662396130376533383965303431643963363638336230396264 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.565000 audit: BPF prog-id=140 op=LOAD Apr 12 21:46:37.565000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025da78 items=0 ppid=3114 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:37.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363662396130376533383965303431643963363638336230396264 Apr 12 21:46:37.684000 audit: BPF prog-id=140 op=UNLOAD Apr 12 21:46:37.684000 audit: BPF prog-id=139 op=UNLOAD Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { perfmon } for pid=3287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit[3287]: AVC avc: denied { bpf } for pid=3287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:37.684000 audit: BPF prog-id=141 op=LOAD Apr 12 21:46:37.684000 audit[3287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025de88 items=0 ppid=3114 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:37.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363662396130376533383965303431643963363638336230396264 Apr 12 21:46:37.997815 env[1474]: time="2024-04-12T21:46:37.997791058Z" level=info msg="StartContainer for \"e966b9a07e389e041d9c6683b09bd80d26d9b17a9b96b3199afb8d2fb0082928\" returns successfully" Apr 12 21:46:38.107130 kubelet[2565]: E0412 21:46:38.107022 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:38.212366 kubelet[2565]: I0412 21:46:38.212123 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5864ffd8c-mv59k" podStartSLOduration=2.629235168 podCreationTimestamp="2024-04-12 21:46:29 +0000 UTC" firstStartedPulling="2024-04-12 21:46:30.757452934 +0000 UTC m=+18.704760119" lastFinishedPulling="2024-04-12 21:46:37.340221913 +0000 UTC m=+25.287529094" observedRunningTime="2024-04-12 21:46:38.211372018 +0000 UTC m=+26.158679267" watchObservedRunningTime="2024-04-12 21:46:38.212004143 +0000 UTC m=+26.159311407" Apr 12 21:46:38.738981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount923314832.mount: Deactivated successfully. Apr 12 21:46:39.193484 kubelet[2565]: I0412 21:46:39.193395 2565 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:46:40.107377 kubelet[2565]: E0412 21:46:40.107273 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:40.601804 kubelet[2565]: I0412 21:46:40.601617 2565 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:46:40.623000 audit[3331]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:40.623000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffb61469f0 a2=0 a3=7fffb61469dc items=0 ppid=2819 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:40.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:40.624000 audit[3331]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:40.624000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffb61469f0 a2=0 a3=7fffb61469dc items=0 ppid=2819 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:40.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:42.106783 kubelet[2565]: E0412 21:46:42.106769 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:42.591139 env[1474]: time="2024-04-12T21:46:42.591057074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:42.591732 env[1474]: time="2024-04-12T21:46:42.591691301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:42.592915 env[1474]: time="2024-04-12T21:46:42.592874795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:42.593653 env[1474]: time="2024-04-12T21:46:42.593612678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:42.594468 env[1474]: time="2024-04-12T21:46:42.594425834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 21:46:42.595687 env[1474]: time="2024-04-12T21:46:42.595646952Z" level=info msg="CreateContainer within sandbox \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 21:46:42.600898 env[1474]: time="2024-04-12T21:46:42.600855057Z" level=info msg="CreateContainer within sandbox \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed\"" Apr 12 21:46:42.601195 env[1474]: time="2024-04-12T21:46:42.601139132Z" level=info msg="StartContainer for \"5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed\"" Apr 12 21:46:42.611166 systemd[1]: Started cri-containerd-5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed.scope. Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.644012 kernel: kauditd_printk_skb: 53 callbacks suppressed Apr 12 21:46:42.644058 kernel: audit: type=1400 audit(1712958402.618:1137): avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f36520e3e78 items=0 ppid=3141 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:42.793300 kernel: audit: type=1300 audit(1712958402.618:1137): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f36520e3e78 items=0 ppid=3141 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:42.793332 kernel: audit: type=1327 audit(1712958402.618:1137): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383639623034316233663439613139333934626465346531316362 Apr 12 21:46:42.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383639623034316233663439613139333934626465346531316362 Apr 12 21:46:42.879500 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.938597 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.998135 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:43.058048 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:43.063917 env[1474]: time="2024-04-12T21:46:43.063887619Z" level=info msg="StartContainer for \"5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed\" returns successfully" Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:43.178468 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:43.178514 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:43.301438 kernel: audit: type=1400 audit(1712958402.618:1138): avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.618000 audit: BPF prog-id=142 op=LOAD Apr 12 21:46:42.618000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000277c58 items=0 ppid=3141 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:42.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383639623034316233663439613139333934626465346531316362 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.702000 audit: BPF prog-id=143 op=LOAD Apr 12 21:46:42.702000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000277ca8 items=0 ppid=3141 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:42.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383639623034316233663439613139333934626465346531316362 Apr 12 21:46:42.879000 audit: BPF prog-id=143 op=UNLOAD Apr 12 21:46:42.879000 audit: BPF prog-id=142 op=UNLOAD Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:42.879000 audit: BPF prog-id=144 op=LOAD Apr 12 21:46:42.879000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000277d38 items=0 ppid=3141 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:42.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383639623034316233663439613139333934626465346531316362 Apr 12 21:46:43.632493 systemd[1]: cri-containerd-5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed.scope: Deactivated successfully. Apr 12 21:46:43.638948 kubelet[2565]: I0412 21:46:43.638871 2565 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 21:46:43.642000 audit: BPF prog-id=144 op=UNLOAD Apr 12 21:46:43.666248 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed-rootfs.mount: Deactivated successfully. Apr 12 21:46:43.666916 kubelet[2565]: I0412 21:46:43.666431 2565 topology_manager.go:215] "Topology Admit Handler" podUID="e557205d-daea-4176-9feb-feb8f6cc6429" podNamespace="kube-system" podName="coredns-5dd5756b68-7wnhv" Apr 12 21:46:43.667266 kubelet[2565]: I0412 21:46:43.667196 2565 topology_manager.go:215] "Topology Admit Handler" podUID="69ba74ab-daf7-4f87-b177-c93b5873a24f" podNamespace="calico-system" podName="calico-kube-controllers-565bdc4d65-2t2c8" Apr 12 21:46:43.668141 kubelet[2565]: I0412 21:46:43.668110 2565 topology_manager.go:215] "Topology Admit Handler" podUID="f792418e-23ed-453d-bb7c-dfc3aa0bf8c0" podNamespace="kube-system" podName="coredns-5dd5756b68-krszp" Apr 12 21:46:43.676558 systemd[1]: Created slice kubepods-burstable-pode557205d_daea_4176_9feb_feb8f6cc6429.slice. Apr 12 21:46:43.684435 systemd[1]: Created slice kubepods-besteffort-pod69ba74ab_daf7_4f87_b177_c93b5873a24f.slice. Apr 12 21:46:43.690104 systemd[1]: Created slice kubepods-burstable-podf792418e_23ed_453d_bb7c_dfc3aa0bf8c0.slice. Apr 12 21:46:43.850996 kubelet[2565]: I0412 21:46:43.850892 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/69ba74ab-daf7-4f87-b177-c93b5873a24f-tigera-ca-bundle\") pod \"calico-kube-controllers-565bdc4d65-2t2c8\" (UID: \"69ba74ab-daf7-4f87-b177-c93b5873a24f\") " pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" Apr 12 21:46:43.850996 kubelet[2565]: I0412 21:46:43.851004 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f792418e-23ed-453d-bb7c-dfc3aa0bf8c0-config-volume\") pod \"coredns-5dd5756b68-krszp\" (UID: \"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0\") " pod="kube-system/coredns-5dd5756b68-krszp" Apr 12 21:46:43.851580 kubelet[2565]: I0412 21:46:43.851288 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e557205d-daea-4176-9feb-feb8f6cc6429-config-volume\") pod \"coredns-5dd5756b68-7wnhv\" (UID: \"e557205d-daea-4176-9feb-feb8f6cc6429\") " pod="kube-system/coredns-5dd5756b68-7wnhv" Apr 12 21:46:43.851580 kubelet[2565]: I0412 21:46:43.851384 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wbtbs\" (UniqueName: \"kubernetes.io/projected/f792418e-23ed-453d-bb7c-dfc3aa0bf8c0-kube-api-access-wbtbs\") pod \"coredns-5dd5756b68-krszp\" (UID: \"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0\") " pod="kube-system/coredns-5dd5756b68-krszp" Apr 12 21:46:43.851580 kubelet[2565]: I0412 21:46:43.851451 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v8mkx\" (UniqueName: \"kubernetes.io/projected/69ba74ab-daf7-4f87-b177-c93b5873a24f-kube-api-access-v8mkx\") pod \"calico-kube-controllers-565bdc4d65-2t2c8\" (UID: \"69ba74ab-daf7-4f87-b177-c93b5873a24f\") " pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" Apr 12 21:46:43.851904 kubelet[2565]: I0412 21:46:43.851706 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gck6k\" (UniqueName: \"kubernetes.io/projected/e557205d-daea-4176-9feb-feb8f6cc6429-kube-api-access-gck6k\") pod \"coredns-5dd5756b68-7wnhv\" (UID: \"e557205d-daea-4176-9feb-feb8f6cc6429\") " pod="kube-system/coredns-5dd5756b68-7wnhv" Apr 12 21:46:43.984735 env[1474]: time="2024-04-12T21:46:43.984524371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7wnhv,Uid:e557205d-daea-4176-9feb-feb8f6cc6429,Namespace:kube-system,Attempt:0,}" Apr 12 21:46:43.988774 env[1474]: time="2024-04-12T21:46:43.988676191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565bdc4d65-2t2c8,Uid:69ba74ab-daf7-4f87-b177-c93b5873a24f,Namespace:calico-system,Attempt:0,}" Apr 12 21:46:43.993920 env[1474]: time="2024-04-12T21:46:43.993817440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-krszp,Uid:f792418e-23ed-453d-bb7c-dfc3aa0bf8c0,Namespace:kube-system,Attempt:0,}" Apr 12 21:46:44.120220 systemd[1]: Created slice kubepods-besteffort-pod589877c5_c6c3_4951_9e7e_7b8f65a7589c.slice. Apr 12 21:46:44.124876 env[1474]: time="2024-04-12T21:46:44.124772477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bnhfc,Uid:589877c5-c6c3-4951-9e7e-7b8f65a7589c,Namespace:calico-system,Attempt:0,}" Apr 12 21:46:44.286041 env[1474]: time="2024-04-12T21:46:44.285810678Z" level=info msg="shim disconnected" id=5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed Apr 12 21:46:44.286041 env[1474]: time="2024-04-12T21:46:44.285936765Z" level=warning msg="cleaning up after shim disconnected" id=5c869b041b3f49a19394bde4e11cbab93b973c360262ed94fa2c0260717a5aed namespace=k8s.io Apr 12 21:46:44.286041 env[1474]: time="2024-04-12T21:46:44.285967827Z" level=info msg="cleaning up dead shim" Apr 12 21:46:44.304010 env[1474]: time="2024-04-12T21:46:44.303892890Z" level=warning msg="cleanup warnings time=\"2024-04-12T21:46:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3394 runtime=io.containerd.runc.v2\n" Apr 12 21:46:44.360958 env[1474]: time="2024-04-12T21:46:44.360909519Z" level=error msg="Failed to destroy network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361060 env[1474]: time="2024-04-12T21:46:44.360909550Z" level=error msg="Failed to destroy network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361060 env[1474]: time="2024-04-12T21:46:44.360989334Z" level=error msg="Failed to destroy network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361118 env[1474]: time="2024-04-12T21:46:44.361053387Z" level=error msg="Failed to destroy network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361172 env[1474]: time="2024-04-12T21:46:44.361155451Z" level=error msg="encountered an error cleaning up failed sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361200 env[1474]: time="2024-04-12T21:46:44.361168443Z" level=error msg="encountered an error cleaning up failed sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361200 env[1474]: time="2024-04-12T21:46:44.361177813Z" level=error msg="encountered an error cleaning up failed sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361200 env[1474]: time="2024-04-12T21:46:44.361186859Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7wnhv,Uid:e557205d-daea-4176-9feb-feb8f6cc6429,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361282 env[1474]: time="2024-04-12T21:46:44.361199759Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565bdc4d65-2t2c8,Uid:69ba74ab-daf7-4f87-b177-c93b5873a24f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361282 env[1474]: time="2024-04-12T21:46:44.361205202Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bnhfc,Uid:589877c5-c6c3-4951-9e7e-7b8f65a7589c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361282 env[1474]: time="2024-04-12T21:46:44.361233517Z" level=error msg="encountered an error cleaning up failed sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361282 env[1474]: time="2024-04-12T21:46:44.361261598Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-krszp,Uid:f792418e-23ed-453d-bb7c-dfc3aa0bf8c0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361393 kubelet[2565]: E0412 21:46:44.361373 2565 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361393 kubelet[2565]: E0412 21:46:44.361373 2565 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361393 kubelet[2565]: E0412 21:46:44.361373 2565 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361465 kubelet[2565]: E0412 21:46:44.361410 2565 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" Apr 12 21:46:44.361465 kubelet[2565]: E0412 21:46:44.361423 2565 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7wnhv" Apr 12 21:46:44.361465 kubelet[2565]: E0412 21:46:44.361427 2565 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" Apr 12 21:46:44.361465 kubelet[2565]: E0412 21:46:44.361436 2565 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7wnhv" Apr 12 21:46:44.361558 kubelet[2565]: E0412 21:46:44.361410 2565 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-krszp" Apr 12 21:46:44.361558 kubelet[2565]: E0412 21:46:44.361463 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-565bdc4d65-2t2c8_calico-system(69ba74ab-daf7-4f87-b177-c93b5873a24f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-565bdc4d65-2t2c8_calico-system(69ba74ab-daf7-4f87-b177-c93b5873a24f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" podUID="69ba74ab-daf7-4f87-b177-c93b5873a24f" Apr 12 21:46:44.361558 kubelet[2565]: E0412 21:46:44.361463 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-7wnhv_kube-system(e557205d-daea-4176-9feb-feb8f6cc6429)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-7wnhv_kube-system(e557205d-daea-4176-9feb-feb8f6cc6429)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7wnhv" podUID="e557205d-daea-4176-9feb-feb8f6cc6429" Apr 12 21:46:44.361715 kubelet[2565]: E0412 21:46:44.361473 2565 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-krszp" Apr 12 21:46:44.361715 kubelet[2565]: E0412 21:46:44.361502 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-krszp_kube-system(f792418e-23ed-453d-bb7c-dfc3aa0bf8c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-krszp_kube-system(f792418e-23ed-453d-bb7c-dfc3aa0bf8c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-krszp" podUID="f792418e-23ed-453d-bb7c-dfc3aa0bf8c0" Apr 12 21:46:44.361715 kubelet[2565]: E0412 21:46:44.361378 2565 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:44.361843 kubelet[2565]: E0412 21:46:44.361529 2565 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:44.361843 kubelet[2565]: E0412 21:46:44.361542 2565 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bnhfc" Apr 12 21:46:44.361843 kubelet[2565]: E0412 21:46:44.361565 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bnhfc_calico-system(589877c5-c6c3-4951-9e7e-7b8f65a7589c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bnhfc_calico-system(589877c5-c6c3-4951-9e7e-7b8f65a7589c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:44.667497 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1-shm.mount: Deactivated successfully. Apr 12 21:46:44.667550 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522-shm.mount: Deactivated successfully. Apr 12 21:46:44.667586 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722-shm.mount: Deactivated successfully. Apr 12 21:46:44.667616 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369-shm.mount: Deactivated successfully. Apr 12 21:46:45.211386 kubelet[2565]: I0412 21:46:45.211327 2565 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:46:45.212885 env[1474]: time="2024-04-12T21:46:45.212806300Z" level=info msg="StopPodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\"" Apr 12 21:46:45.213757 kubelet[2565]: I0412 21:46:45.213710 2565 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:46:45.215085 env[1474]: time="2024-04-12T21:46:45.214975040Z" level=info msg="StopPodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\"" Apr 12 21:46:45.216080 kubelet[2565]: I0412 21:46:45.216030 2565 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:46:45.217310 env[1474]: time="2024-04-12T21:46:45.217205563Z" level=info msg="StopPodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\"" Apr 12 21:46:45.218522 kubelet[2565]: I0412 21:46:45.218478 2565 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:46:45.219449 env[1474]: time="2024-04-12T21:46:45.219431245Z" level=info msg="StopPodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\"" Apr 12 21:46:45.220736 env[1474]: time="2024-04-12T21:46:45.220704677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 21:46:45.232344 env[1474]: time="2024-04-12T21:46:45.232302222Z" level=error msg="StopPodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" failed" error="failed to destroy network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:45.232505 kubelet[2565]: E0412 21:46:45.232489 2565 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:46:45.232576 kubelet[2565]: E0412 21:46:45.232536 2565 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369"} Apr 12 21:46:45.232576 kubelet[2565]: E0412 21:46:45.232570 2565 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e557205d-daea-4176-9feb-feb8f6cc6429\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:46:45.232654 env[1474]: time="2024-04-12T21:46:45.232553908Z" level=error msg="StopPodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" failed" error="failed to destroy network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:45.232683 kubelet[2565]: E0412 21:46:45.232594 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e557205d-daea-4176-9feb-feb8f6cc6429\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7wnhv" podUID="e557205d-daea-4176-9feb-feb8f6cc6429" Apr 12 21:46:45.232683 kubelet[2565]: E0412 21:46:45.232672 2565 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:46:45.232744 kubelet[2565]: E0412 21:46:45.232686 2565 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522"} Apr 12 21:46:45.232744 kubelet[2565]: E0412 21:46:45.232706 2565 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:46:45.232744 kubelet[2565]: E0412 21:46:45.232728 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-krszp" podUID="f792418e-23ed-453d-bb7c-dfc3aa0bf8c0" Apr 12 21:46:45.232928 env[1474]: time="2024-04-12T21:46:45.232908538Z" level=error msg="StopPodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" failed" error="failed to destroy network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:45.232983 kubelet[2565]: E0412 21:46:45.232979 2565 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:46:45.233011 kubelet[2565]: E0412 21:46:45.232989 2565 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1"} Apr 12 21:46:45.233011 kubelet[2565]: E0412 21:46:45.233005 2565 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:46:45.233068 kubelet[2565]: E0412 21:46:45.233019 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"589877c5-c6c3-4951-9e7e-7b8f65a7589c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bnhfc" podUID="589877c5-c6c3-4951-9e7e-7b8f65a7589c" Apr 12 21:46:45.234131 env[1474]: time="2024-04-12T21:46:45.234088397Z" level=error msg="StopPodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" failed" error="failed to destroy network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:46:45.234191 kubelet[2565]: E0412 21:46:45.234184 2565 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:46:45.234220 kubelet[2565]: E0412 21:46:45.234198 2565 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722"} Apr 12 21:46:45.234220 kubelet[2565]: E0412 21:46:45.234216 2565 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"69ba74ab-daf7-4f87-b177-c93b5873a24f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:46:45.234287 kubelet[2565]: E0412 21:46:45.234235 2565 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"69ba74ab-daf7-4f87-b177-c93b5873a24f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" podUID="69ba74ab-daf7-4f87-b177-c93b5873a24f" Apr 12 21:46:51.091440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3258057940.mount: Deactivated successfully. Apr 12 21:46:51.115076 env[1474]: time="2024-04-12T21:46:51.115022512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:51.115804 env[1474]: time="2024-04-12T21:46:51.115760800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:51.116530 env[1474]: time="2024-04-12T21:46:51.116488613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:51.117211 env[1474]: time="2024-04-12T21:46:51.117170824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:46:51.117570 env[1474]: time="2024-04-12T21:46:51.117519029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 21:46:51.122059 env[1474]: time="2024-04-12T21:46:51.122042450Z" level=info msg="CreateContainer within sandbox \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 21:46:51.130129 env[1474]: time="2024-04-12T21:46:51.130079997Z" level=info msg="CreateContainer within sandbox \"e7b098ed5eb4992e5c98e6a34418e4b96e3a80caf3442951b572b3e8b84bc09b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1d867222c9d2241c40888041dacb845a1da4014e87ac59813fbc99c913fd60b7\"" Apr 12 21:46:51.130465 env[1474]: time="2024-04-12T21:46:51.130408351Z" level=info msg="StartContainer for \"1d867222c9d2241c40888041dacb845a1da4014e87ac59813fbc99c913fd60b7\"" Apr 12 21:46:51.139187 systemd[1]: Started cri-containerd-1d867222c9d2241c40888041dacb845a1da4014e87ac59813fbc99c913fd60b7.scope. Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.175016 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 21:46:51.175057 kernel: audit: type=1400 audit(1712958411.147:1144): avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb2bdd5c008 items=0 ppid=3141 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:51.338433 kernel: audit: type=1300 audit(1712958411.147:1144): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb2bdd5c008 items=0 ppid=3141 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:51.338481 kernel: audit: type=1327 audit(1712958411.147:1144): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383637323232633964323234316334303838383034316461636238 Apr 12 21:46:51.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383637323232633964323234316334303838383034316461636238 Apr 12 21:46:51.432398 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.496410 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.560432 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.624439 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.630172 env[1474]: time="2024-04-12T21:46:51.630121805Z" level=info msg="StartContainer for \"1d867222c9d2241c40888041dacb845a1da4014e87ac59813fbc99c913fd60b7\" returns successfully" Apr 12 21:46:51.688866 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.753272 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.817654 kernel: audit: type=1400 audit(1712958411.147:1145): avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.147000 audit: BPF prog-id=145 op=LOAD Apr 12 21:46:51.147000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c03f8 items=0 ppid=3141 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:51.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383637323232633964323234316334303838383034316461636238 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.237000 audit: BPF prog-id=146 op=LOAD Apr 12 21:46:51.237000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c0448 items=0 ppid=3141 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:51.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383637323232633964323234316334303838383034316461636238 Apr 12 21:46:51.431000 audit: BPF prog-id=146 op=UNLOAD Apr 12 21:46:51.431000 audit: BPF prog-id=145 op=UNLOAD Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:51.431000 audit: BPF prog-id=147 op=LOAD Apr 12 21:46:51.431000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c04d8 items=0 ppid=3141 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:51.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383637323232633964323234316334303838383034316461636238 Apr 12 21:46:51.966579 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 21:46:51.966615 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 21:46:52.266819 kubelet[2565]: I0412 21:46:52.266758 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-slf2k" podStartSLOduration=1.894048267 podCreationTimestamp="2024-04-12 21:46:30 +0000 UTC" firstStartedPulling="2024-04-12 21:46:30.745093371 +0000 UTC m=+18.692400559" lastFinishedPulling="2024-04-12 21:46:51.11772495 +0000 UTC m=+39.065032134" observedRunningTime="2024-04-12 21:46:52.26541999 +0000 UTC m=+40.212727232" watchObservedRunningTime="2024-04-12 21:46:52.266679842 +0000 UTC m=+40.213987064" Apr 12 21:46:53.160000 audit[3858]: AVC avc: denied { write } for pid=3858 comm="tee" name="fd" dev="proc" ino=39974 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.160000 audit[3857]: AVC avc: denied { write } for pid=3857 comm="tee" name="fd" dev="proc" ino=31504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.160000 audit[3858]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9d959971 a2=241 a3=1b6 items=1 ppid=3830 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.160000 audit[3857]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7d5e2961 a2=241 a3=1b6 items=1 ppid=3827 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.160000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 21:46:53.160000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 21:46:53.160000 audit: PATH item=0 name="/dev/fd/63" inode=20351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.160000 audit: PATH item=0 name="/dev/fd/63" inode=35551 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.160000 audit[3866]: AVC avc: denied { write } for pid=3866 comm="tee" name="fd" dev="proc" ino=25469 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.160000 audit[3866]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffc961972 a2=241 a3=1b6 items=1 ppid=3826 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.160000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 21:46:53.160000 audit: PATH item=0 name="/dev/fd/63" inode=25466 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.160000 audit[3870]: AVC avc: denied { write } for pid=3870 comm="tee" name="fd" dev="proc" ino=38018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.160000 audit[3870]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe73a09973 a2=241 a3=1b6 items=1 ppid=3829 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.160000 audit[3864]: AVC avc: denied { write } for pid=3864 comm="tee" name="fd" dev="proc" ino=35554 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.160000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 21:46:53.160000 audit: PATH item=0 name="/dev/fd/63" inode=20352 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.160000 audit[3864]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9cb1c971 a2=241 a3=1b6 items=1 ppid=3828 pid=3864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.160000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 21:46:53.160000 audit: PATH item=0 name="/dev/fd/63" inode=29515 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.160000 audit[3871]: AVC avc: denied { write } for pid=3871 comm="tee" name="fd" dev="proc" ino=30465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.160000 audit[3871]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7582a962 a2=241 a3=1b6 items=1 ppid=3824 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.160000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 21:46:53.160000 audit: PATH item=0 name="/dev/fd/63" inode=34522 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.161000 audit[3869]: AVC avc: denied { write } for pid=3869 comm="tee" name="fd" dev="proc" ino=39978 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:46:53.161000 audit[3869]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc32a9971 a2=241 a3=1b6 items=1 ppid=3825 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.161000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 21:46:53.161000 audit: PATH item=0 name="/dev/fd/63" inode=30462 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:46:53.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.250000 audit: BPF prog-id=148 op=LOAD Apr 12 21:46:53.250000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe789424e0 a2=70 a3=7f23b702a000 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.250000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit: BPF prog-id=148 op=UNLOAD Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit: BPF prog-id=149 op=LOAD Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe789424e0 a2=70 a3=6f items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit: BPF prog-id=149 op=UNLOAD Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe78942490 a2=70 a3=7ffe789424e0 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit: BPF prog-id=150 op=LOAD Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe78942470 a2=70 a3=7ffe789424e0 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit: BPF prog-id=150 op=UNLOAD Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe78942550 a2=70 a3=0 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe78942540 a2=70 a3=0 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe789424b0 a2=70 a3=0 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe78942580 a2=70 a3=124ee10 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe78942580 a2=70 a3=124b880 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.251000 audit: BPF prog-id=151 op=LOAD Apr 12 21:46:53.251000 audit[4012]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe789424a0 a2=70 a3=0 items=0 ppid=3836 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.251000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:46:53.252000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.252000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde19a3800 a2=70 a3=fff80800 items=0 ppid=3836 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 21:46:53.252000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:53.252000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde19a36d0 a2=70 a3=3 items=0 ppid=3836 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 21:46:53.262000 audit: BPF prog-id=151 op=UNLOAD Apr 12 21:46:53.290000 audit[4077]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4077 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:53.290000 audit[4077]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff78332240 a2=0 a3=7fff7833222c items=0 ppid=3836 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.290000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:53.292000 audit[4072]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4072 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:53.292000 audit[4072]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffd04608620 a2=0 a3=7ffd0460860c items=0 ppid=3836 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.292000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:53.293000 audit[4073]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:53.293000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff59cda740 a2=0 a3=7fff59cda72c items=0 ppid=3836 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.293000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:53.293000 audit[4074]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:53.293000 audit[4074]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcd4d3fd20 a2=0 a3=7ffcd4d3fd0c items=0 ppid=3836 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:53.293000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:54.230089 systemd-networkd[1320]: vxlan.calico: Link UP Apr 12 21:46:54.230093 systemd-networkd[1320]: vxlan.calico: Gained carrier Apr 12 21:46:55.583581 systemd-networkd[1320]: vxlan.calico: Gained IPv6LL Apr 12 21:46:57.108101 env[1474]: time="2024-04-12T21:46:57.107955382Z" level=info msg="StopPodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\"" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.145 [INFO][4105] k8s.go 585: Cleaning up netns ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.145 [INFO][4105] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" iface="eth0" netns="/var/run/netns/cni-1c3c1f17-bf8f-86ff-162b-c4098812131c" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.146 [INFO][4105] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" iface="eth0" netns="/var/run/netns/cni-1c3c1f17-bf8f-86ff-162b-c4098812131c" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.146 [INFO][4105] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" iface="eth0" netns="/var/run/netns/cni-1c3c1f17-bf8f-86ff-162b-c4098812131c" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.146 [INFO][4105] k8s.go 592: Releasing IP address(es) ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.146 [INFO][4105] utils.go 188: Calico CNI releasing IP address ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.155 [INFO][4121] ipam_plugin.go 415: Releasing address using handleID ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.155 [INFO][4121] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.155 [INFO][4121] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.159 [WARNING][4121] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.159 [INFO][4121] ipam_plugin.go 443: Releasing address using workloadID ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.160 [INFO][4121] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:46:57.162187 env[1474]: 2024-04-12 21:46:57.161 [INFO][4105] k8s.go 598: Teardown processing complete. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:46:57.162660 env[1474]: time="2024-04-12T21:46:57.162262839Z" level=info msg="TearDown network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" successfully" Apr 12 21:46:57.162660 env[1474]: time="2024-04-12T21:46:57.162282657Z" level=info msg="StopPodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" returns successfully" Apr 12 21:46:57.162728 env[1474]: time="2024-04-12T21:46:57.162700376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7wnhv,Uid:e557205d-daea-4176-9feb-feb8f6cc6429,Namespace:kube-system,Attempt:1,}" Apr 12 21:46:57.163582 systemd[1]: run-netns-cni\x2d1c3c1f17\x2dbf8f\x2d86ff\x2d162b\x2dc4098812131c.mount: Deactivated successfully. Apr 12 21:46:57.327633 systemd-networkd[1320]: cali5a86dafb195: Link UP Apr 12 21:46:57.390525 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:46:57.390574 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a86dafb195: link becomes ready Apr 12 21:46:57.390648 systemd-networkd[1320]: cali5a86dafb195: Gained carrier Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.189 [INFO][4135] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0 coredns-5dd5756b68- kube-system e557205d-daea-4176-9feb-feb8f6cc6429 701 0 2024-04-12 21:46:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-26e8ad9098 coredns-5dd5756b68-7wnhv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5a86dafb195 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.189 [INFO][4135] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.260 [INFO][4155] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" HandleID="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.277 [INFO][4155] ipam_plugin.go 268: Auto assigning IP ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" HandleID="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005186c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-26e8ad9098", "pod":"coredns-5dd5756b68-7wnhv", "timestamp":"2024-04-12 21:46:57.259971424 +0000 UTC"}, Hostname:"ci-3510.3.3-a-26e8ad9098", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.277 [INFO][4155] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.277 [INFO][4155] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.277 [INFO][4155] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-26e8ad9098' Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.280 [INFO][4155] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.287 [INFO][4155] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.295 [INFO][4155] ipam.go 489: Trying affinity for 192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.298 [INFO][4155] ipam.go 155: Attempting to load block cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.302 [INFO][4155] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.303 [INFO][4155] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.192/26 handle="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.305 [INFO][4155] ipam.go 1682: Creating new handle: k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.311 [INFO][4155] ipam.go 1203: Writing block in order to claim IPs block=192.168.43.192/26 handle="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.319 [INFO][4155] ipam.go 1216: Successfully claimed IPs: [192.168.43.193/26] block=192.168.43.192/26 handle="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.319 [INFO][4155] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.193/26] handle="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.319 [INFO][4155] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:46:57.396367 env[1474]: 2024-04-12 21:46:57.319 [INFO][4155] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.43.193/26] IPv6=[] ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" HandleID="k8s-pod-network.91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.396882 env[1474]: 2024-04-12 21:46:57.324 [INFO][4135] k8s.go 385: Populated endpoint ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e557205d-daea-4176-9feb-feb8f6cc6429", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"", Pod:"coredns-5dd5756b68-7wnhv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a86dafb195", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:46:57.396882 env[1474]: 2024-04-12 21:46:57.324 [INFO][4135] k8s.go 386: Calico CNI using IPs: [192.168.43.193/32] ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.396882 env[1474]: 2024-04-12 21:46:57.324 [INFO][4135] dataplane_linux.go 68: Setting the host side veth name to cali5a86dafb195 ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.396882 env[1474]: 2024-04-12 21:46:57.390 [INFO][4135] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.396882 env[1474]: 2024-04-12 21:46:57.390 [INFO][4135] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e557205d-daea-4176-9feb-feb8f6cc6429", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca", Pod:"coredns-5dd5756b68-7wnhv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a86dafb195", MAC:"86:43:6e:a1:e7:9e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:46:57.396882 env[1474]: 2024-04-12 21:46:57.395 [INFO][4135] k8s.go 498: Wrote updated endpoint to datastore ContainerID="91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca" Namespace="kube-system" Pod="coredns-5dd5756b68-7wnhv" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:46:57.401911 env[1474]: time="2024-04-12T21:46:57.401877484Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:57.401911 env[1474]: time="2024-04-12T21:46:57.401898750Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:57.401911 env[1474]: time="2024-04-12T21:46:57.401906113Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:57.402039 env[1474]: time="2024-04-12T21:46:57.401969843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca pid=4199 runtime=io.containerd.runc.v2 Apr 12 21:46:57.402000 audit[4207]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4207 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:57.408294 systemd[1]: Started cri-containerd-91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca.scope. Apr 12 21:46:57.430238 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 21:46:57.430283 kernel: audit: type=1325 audit(1712958417.402:1177): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4207 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:57.402000 audit[4207]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7fff46613df0 a2=0 a3=7fff46613ddc items=0 ppid=3836 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.489284 kernel: audit: type=1300 audit(1712958417.402:1177): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7fff46613df0 a2=0 a3=7fff46613ddc items=0 ppid=3836 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.402000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:57.585273 kernel: audit: type=1327 audit(1712958417.402:1177): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.709204 kernel: audit: type=1400 audit(1712958417.588:1178): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.709246 kernel: audit: type=1400 audit(1712958417.588:1179): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.772242 kernel: audit: type=1400 audit(1712958417.588:1180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.835305 kernel: audit: type=1400 audit(1712958417.588:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.961181 kernel: audit: type=1400 audit(1712958417.588:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.961214 kernel: audit: type=1400 audit(1712958417.588:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.024258 kernel: audit: type=1400 audit(1712958417.588:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.707000 audit: BPF prog-id=152 op=LOAD Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4199 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313336643131326537653039306161626435373739323737373532 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4199 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313336643131326537653039306161626435373739323737373532 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.708000 audit: BPF prog-id=153 op=LOAD Apr 12 21:46:57.708000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325a70 items=0 ppid=4199 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313336643131326537653039306161626435373739323737373532 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.833000 audit: BPF prog-id=154 op=LOAD Apr 12 21:46:57.833000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000325ab8 items=0 ppid=4199 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313336643131326537653039306161626435373739323737373532 Apr 12 21:46:57.959000 audit: BPF prog-id=154 op=UNLOAD Apr 12 21:46:57.959000 audit: BPF prog-id=153 op=UNLOAD Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:57.959000 audit: BPF prog-id=155 op=LOAD Apr 12 21:46:57.959000 audit[4209]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325ec8 items=0 ppid=4199 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:57.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931313336643131326537653039306161626435373739323737373532 Apr 12 21:46:58.103507 env[1474]: time="2024-04-12T21:46:58.103481567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7wnhv,Uid:e557205d-daea-4176-9feb-feb8f6cc6429,Namespace:kube-system,Attempt:1,} returns sandbox id \"91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca\"" Apr 12 21:46:58.104775 env[1474]: time="2024-04-12T21:46:58.104757778Z" level=info msg="CreateContainer within sandbox \"91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 21:46:58.106132 env[1474]: time="2024-04-12T21:46:58.106120689Z" level=info msg="StopPodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\"" Apr 12 21:46:58.109052 env[1474]: time="2024-04-12T21:46:58.109031494Z" level=info msg="CreateContainer within sandbox \"91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e2f7651bac8e6baf7ff6f6f935dbfff5991247dcb8ce855dda9ab07d2a856620\"" Apr 12 21:46:58.109267 env[1474]: time="2024-04-12T21:46:58.109255753Z" level=info msg="StartContainer for \"e2f7651bac8e6baf7ff6f6f935dbfff5991247dcb8ce855dda9ab07d2a856620\"" Apr 12 21:46:58.116717 systemd[1]: Started cri-containerd-e2f7651bac8e6baf7ff6f6f935dbfff5991247dcb8ce855dda9ab07d2a856620.scope. Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit: BPF prog-id=156 op=LOAD Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4199 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663736353162616338653662616637666636663666393335646266 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4199 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663736353162616338653662616637666636663666393335646266 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit: BPF prog-id=157 op=LOAD Apr 12 21:46:58.123000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00032cb00 items=0 ppid=4199 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663736353162616338653662616637666636663666393335646266 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit: BPF prog-id=158 op=LOAD Apr 12 21:46:58.123000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00032cb48 items=0 ppid=4199 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663736353162616338653662616637666636663666393335646266 Apr 12 21:46:58.123000 audit: BPF prog-id=158 op=UNLOAD Apr 12 21:46:58.123000 audit: BPF prog-id=157 op=UNLOAD Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.123000 audit: BPF prog-id=159 op=LOAD Apr 12 21:46:58.123000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032cf58 items=0 ppid=4199 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532663736353162616338653662616637666636663666393335646266 Apr 12 21:46:58.129489 env[1474]: time="2024-04-12T21:46:58.129436455Z" level=info msg="StartContainer for \"e2f7651bac8e6baf7ff6f6f935dbfff5991247dcb8ce855dda9ab07d2a856620\" returns successfully" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.128 [INFO][4246] k8s.go 585: Cleaning up netns ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.128 [INFO][4246] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" iface="eth0" netns="/var/run/netns/cni-d4ea973d-e61b-65a4-5d5d-f3ed5a08fac7" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.128 [INFO][4246] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" iface="eth0" netns="/var/run/netns/cni-d4ea973d-e61b-65a4-5d5d-f3ed5a08fac7" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.128 [INFO][4246] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" iface="eth0" netns="/var/run/netns/cni-d4ea973d-e61b-65a4-5d5d-f3ed5a08fac7" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.128 [INFO][4246] k8s.go 592: Releasing IP address(es) ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.128 [INFO][4246] utils.go 188: Calico CNI releasing IP address ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.138 [INFO][4295] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.138 [INFO][4295] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.138 [INFO][4295] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.142 [WARNING][4295] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.142 [INFO][4295] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.143 [INFO][4295] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:46:58.144841 env[1474]: 2024-04-12 21:46:58.144 [INFO][4246] k8s.go 598: Teardown processing complete. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:46:58.145150 env[1474]: time="2024-04-12T21:46:58.144922161Z" level=info msg="TearDown network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" successfully" Apr 12 21:46:58.145150 env[1474]: time="2024-04-12T21:46:58.144942126Z" level=info msg="StopPodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" returns successfully" Apr 12 21:46:58.145296 env[1474]: time="2024-04-12T21:46:58.145258726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-krszp,Uid:f792418e-23ed-453d-bb7c-dfc3aa0bf8c0,Namespace:kube-system,Attempt:1,}" Apr 12 21:46:58.164616 systemd[1]: run-netns-cni\x2dd4ea973d\x2de61b\x2d65a4\x2d5d5d\x2df3ed5a08fac7.mount: Deactivated successfully. Apr 12 21:46:58.210739 systemd-networkd[1320]: cali2b4af930120: Link UP Apr 12 21:46:58.239258 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2b4af930120: link becomes ready Apr 12 21:46:58.239607 systemd-networkd[1320]: cali2b4af930120: Gained carrier Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.166 [INFO][4331] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0 coredns-5dd5756b68- kube-system f792418e-23ed-453d-bb7c-dfc3aa0bf8c0 709 0 2024-04-12 21:46:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-26e8ad9098 coredns-5dd5756b68-krszp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2b4af930120 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.166 [INFO][4331] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.180 [INFO][4354] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" HandleID="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.185 [INFO][4354] ipam_plugin.go 268: Auto assigning IP ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" HandleID="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000342f70), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-26e8ad9098", "pod":"coredns-5dd5756b68-krszp", "timestamp":"2024-04-12 21:46:58.180004025 +0000 UTC"}, Hostname:"ci-3510.3.3-a-26e8ad9098", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.185 [INFO][4354] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.185 [INFO][4354] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.185 [INFO][4354] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-26e8ad9098' Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.186 [INFO][4354] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.189 [INFO][4354] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.192 [INFO][4354] ipam.go 489: Trying affinity for 192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.193 [INFO][4354] ipam.go 155: Attempting to load block cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.195 [INFO][4354] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.195 [INFO][4354] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.192/26 handle="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.196 [INFO][4354] ipam.go 1682: Creating new handle: k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05 Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.198 [INFO][4354] ipam.go 1203: Writing block in order to claim IPs block=192.168.43.192/26 handle="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.202 [INFO][4354] ipam.go 1216: Successfully claimed IPs: [192.168.43.194/26] block=192.168.43.192/26 handle="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.202 [INFO][4354] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.194/26] handle="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.202 [INFO][4354] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:46:58.245348 env[1474]: 2024-04-12 21:46:58.202 [INFO][4354] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.43.194/26] IPv6=[] ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" HandleID="k8s-pod-network.61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.245875 env[1474]: 2024-04-12 21:46:58.209 [INFO][4331] k8s.go 385: Populated endpoint ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"", Pod:"coredns-5dd5756b68-krszp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2b4af930120", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:46:58.245875 env[1474]: 2024-04-12 21:46:58.210 [INFO][4331] k8s.go 386: Calico CNI using IPs: [192.168.43.194/32] ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.245875 env[1474]: 2024-04-12 21:46:58.210 [INFO][4331] dataplane_linux.go 68: Setting the host side veth name to cali2b4af930120 ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.245875 env[1474]: 2024-04-12 21:46:58.239 [INFO][4331] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.245875 env[1474]: 2024-04-12 21:46:58.239 [INFO][4331] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05", Pod:"coredns-5dd5756b68-krszp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2b4af930120", MAC:"32:6a:9c:94:58:22", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:46:58.245875 env[1474]: 2024-04-12 21:46:58.244 [INFO][4331] k8s.go 498: Wrote updated endpoint to datastore ContainerID="61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05" Namespace="kube-system" Pod="coredns-5dd5756b68-krszp" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:46:58.251059 env[1474]: time="2024-04-12T21:46:58.251021708Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:58.251059 env[1474]: time="2024-04-12T21:46:58.251046542Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:58.251059 env[1474]: time="2024-04-12T21:46:58.251053708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:58.250000 audit[4387]: NETFILTER_CFG table=filter:102 family=2 entries=30 op=nft_register_chain pid=4387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:58.250000 audit[4387]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffd5eafa5d0 a2=0 a3=7ffd5eafa5bc items=0 ppid=3836 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.250000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:58.251323 env[1474]: time="2024-04-12T21:46:58.251135276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05 pid=4388 runtime=io.containerd.runc.v2 Apr 12 21:46:58.258637 systemd[1]: Started cri-containerd-61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05.scope. Apr 12 21:46:58.261821 kubelet[2565]: I0412 21:46:58.261801 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-7wnhv" podStartSLOduration=34.261770986 podCreationTimestamp="2024-04-12 21:46:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:46:58.261415217 +0000 UTC m=+46.208722405" watchObservedRunningTime="2024-04-12 21:46:58.261770986 +0000 UTC m=+46.209078169" Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit: BPF prog-id=160 op=LOAD Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4388 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623863373930303961333235363463376637343630613634383334 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4388 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623863373930303961333235363463376637343630613634383334 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit: BPF prog-id=161 op=LOAD Apr 12 21:46:58.264000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001dbae0 items=0 ppid=4388 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623863373930303961333235363463376637343630613634383334 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit: BPF prog-id=162 op=LOAD Apr 12 21:46:58.264000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001dbb28 items=0 ppid=4388 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623863373930303961333235363463376637343630613634383334 Apr 12 21:46:58.264000 audit: BPF prog-id=162 op=UNLOAD Apr 12 21:46:58.264000 audit: BPF prog-id=161 op=UNLOAD Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.264000 audit: BPF prog-id=163 op=LOAD Apr 12 21:46:58.264000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001dbf38 items=0 ppid=4388 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623863373930303961333235363463376637343630613634383334 Apr 12 21:46:58.271000 audit[4416]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=4416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:58.271000 audit[4416]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffecb903af0 a2=0 a3=7ffecb903adc items=0 ppid=2819 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:58.281418 env[1474]: time="2024-04-12T21:46:58.281391795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-krszp,Uid:f792418e-23ed-453d-bb7c-dfc3aa0bf8c0,Namespace:kube-system,Attempt:1,} returns sandbox id \"61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05\"" Apr 12 21:46:58.282594 env[1474]: time="2024-04-12T21:46:58.282578365Z" level=info msg="CreateContainer within sandbox \"61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 21:46:58.272000 audit[4416]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:58.272000 audit[4416]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffecb903af0 a2=0 a3=0 items=0 ppid=2819 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:58.307582 env[1474]: time="2024-04-12T21:46:58.307452526Z" level=info msg="CreateContainer within sandbox \"61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e4ac1a624a06eb809e0595bfb369751ebbd69bb7ebdec72b066e7534d3e6804a\"" Apr 12 21:46:58.308456 env[1474]: time="2024-04-12T21:46:58.308370286Z" level=info msg="StartContainer for \"e4ac1a624a06eb809e0595bfb369751ebbd69bb7ebdec72b066e7534d3e6804a\"" Apr 12 21:46:58.313000 audit[4429]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:58.313000 audit[4429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc13979db0 a2=0 a3=7ffc13979d9c items=0 ppid=2819 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:58.316000 audit[4429]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:58.316000 audit[4429]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc13979db0 a2=0 a3=7ffc13979d9c items=0 ppid=2819 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:58.339505 systemd[1]: Started cri-containerd-e4ac1a624a06eb809e0595bfb369751ebbd69bb7ebdec72b066e7534d3e6804a.scope. Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.360000 audit: BPF prog-id=164 op=LOAD Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4388 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534616331613632346130366562383039653035393562666233363937 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4388 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534616331613632346130366562383039653035393562666233363937 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit: BPF prog-id=165 op=LOAD Apr 12 21:46:58.361000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000220ec0 items=0 ppid=4388 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534616331613632346130366562383039653035393562666233363937 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.361000 audit: BPF prog-id=166 op=LOAD Apr 12 21:46:58.361000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000220f08 items=0 ppid=4388 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534616331613632346130366562383039653035393562666233363937 Apr 12 21:46:58.362000 audit: BPF prog-id=166 op=UNLOAD Apr 12 21:46:58.362000 audit: BPF prog-id=165 op=UNLOAD Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { perfmon } for pid=4438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:58.362000 audit: BPF prog-id=167 op=LOAD Apr 12 21:46:58.362000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000221318 items=0 ppid=4388 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:58.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534616331613632346130366562383039653035393562666233363937 Apr 12 21:46:58.377820 env[1474]: time="2024-04-12T21:46:58.377759145Z" level=info msg="StartContainer for \"e4ac1a624a06eb809e0595bfb369751ebbd69bb7ebdec72b066e7534d3e6804a\" returns successfully" Apr 12 21:46:58.975478 systemd-networkd[1320]: cali5a86dafb195: Gained IPv6LL Apr 12 21:46:59.108009 env[1474]: time="2024-04-12T21:46:59.107913261Z" level=info msg="StopPodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\"" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.174 [INFO][4498] k8s.go 585: Cleaning up netns ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.174 [INFO][4498] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" iface="eth0" netns="/var/run/netns/cni-0b716b2c-78ed-b410-f302-2e2d48c59206" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.175 [INFO][4498] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" iface="eth0" netns="/var/run/netns/cni-0b716b2c-78ed-b410-f302-2e2d48c59206" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.175 [INFO][4498] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" iface="eth0" netns="/var/run/netns/cni-0b716b2c-78ed-b410-f302-2e2d48c59206" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.175 [INFO][4498] k8s.go 592: Releasing IP address(es) ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.175 [INFO][4498] utils.go 188: Calico CNI releasing IP address ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.190 [INFO][4515] ipam_plugin.go 415: Releasing address using handleID ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.190 [INFO][4515] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.190 [INFO][4515] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.196 [WARNING][4515] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.196 [INFO][4515] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.200 [INFO][4515] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:46:59.205048 env[1474]: 2024-04-12 21:46:59.202 [INFO][4498] k8s.go 598: Teardown processing complete. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:46:59.206946 env[1474]: time="2024-04-12T21:46:59.205306727Z" level=info msg="TearDown network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" successfully" Apr 12 21:46:59.206946 env[1474]: time="2024-04-12T21:46:59.205387115Z" level=info msg="StopPodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" returns successfully" Apr 12 21:46:59.206946 env[1474]: time="2024-04-12T21:46:59.206657442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bnhfc,Uid:589877c5-c6c3-4951-9e7e-7b8f65a7589c,Namespace:calico-system,Attempt:1,}" Apr 12 21:46:59.211635 systemd[1]: run-netns-cni\x2d0b716b2c\x2d78ed\x2db410\x2df302\x2d2e2d48c59206.mount: Deactivated successfully. Apr 12 21:46:59.270463 kubelet[2565]: I0412 21:46:59.270392 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-krszp" podStartSLOduration=35.270355568 podCreationTimestamp="2024-04-12 21:46:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 21:46:59.270018955 +0000 UTC m=+47.217326164" watchObservedRunningTime="2024-04-12 21:46:59.270355568 +0000 UTC m=+47.217662757" Apr 12 21:46:59.275000 audit[4560]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:59.275000 audit[4560]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef62555e0 a2=0 a3=7ffef62555cc items=0 ppid=2819 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:59.286000 audit[4560]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:46:59.286000 audit[4560]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffef62555e0 a2=0 a3=7ffef62555cc items=0 ppid=2819 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:46:59.358141 systemd-networkd[1320]: cali587409aefdf: Link UP Apr 12 21:46:59.420848 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:46:59.420903 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali587409aefdf: link becomes ready Apr 12 21:46:59.421002 systemd-networkd[1320]: cali587409aefdf: Gained carrier Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.267 [INFO][4531] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0 csi-node-driver- calico-system 589877c5-c6c3-4951-9e7e-7b8f65a7589c 728 0 2024-04-12 21:46:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-26e8ad9098 csi-node-driver-bnhfc eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali587409aefdf [] []}} ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.267 [INFO][4531] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.288 [INFO][4555] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" HandleID="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.297 [INFO][4555] ipam_plugin.go 268: Auto assigning IP ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" HandleID="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ab520), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-26e8ad9098", "pod":"csi-node-driver-bnhfc", "timestamp":"2024-04-12 21:46:59.288952254 +0000 UTC"}, Hostname:"ci-3510.3.3-a-26e8ad9098", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.297 [INFO][4555] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.297 [INFO][4555] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.297 [INFO][4555] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-26e8ad9098' Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.301 [INFO][4555] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.310 [INFO][4555] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.319 [INFO][4555] ipam.go 489: Trying affinity for 192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.323 [INFO][4555] ipam.go 155: Attempting to load block cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.328 [INFO][4555] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.328 [INFO][4555] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.192/26 handle="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.332 [INFO][4555] ipam.go 1682: Creating new handle: k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41 Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.341 [INFO][4555] ipam.go 1203: Writing block in order to claim IPs block=192.168.43.192/26 handle="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.350 [INFO][4555] ipam.go 1216: Successfully claimed IPs: [192.168.43.195/26] block=192.168.43.192/26 handle="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.351 [INFO][4555] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.195/26] handle="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.351 [INFO][4555] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:46:59.426508 env[1474]: 2024-04-12 21:46:59.351 [INFO][4555] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.43.195/26] IPv6=[] ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" HandleID="k8s-pod-network.40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.427192 env[1474]: 2024-04-12 21:46:59.354 [INFO][4531] k8s.go 385: Populated endpoint ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"589877c5-c6c3-4951-9e7e-7b8f65a7589c", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"", Pod:"csi-node-driver-bnhfc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.43.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali587409aefdf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:46:59.427192 env[1474]: 2024-04-12 21:46:59.355 [INFO][4531] k8s.go 386: Calico CNI using IPs: [192.168.43.195/32] ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.427192 env[1474]: 2024-04-12 21:46:59.355 [INFO][4531] dataplane_linux.go 68: Setting the host side veth name to cali587409aefdf ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.427192 env[1474]: 2024-04-12 21:46:59.420 [INFO][4531] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.427192 env[1474]: 2024-04-12 21:46:59.421 [INFO][4531] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"589877c5-c6c3-4951-9e7e-7b8f65a7589c", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41", Pod:"csi-node-driver-bnhfc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.43.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali587409aefdf", MAC:"da:67:df:0c:1b:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:46:59.427192 env[1474]: 2024-04-12 21:46:59.425 [INFO][4531] k8s.go 498: Wrote updated endpoint to datastore ContainerID="40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41" Namespace="calico-system" Pod="csi-node-driver-bnhfc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:46:59.432477 env[1474]: time="2024-04-12T21:46:59.432408750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:46:59.432477 env[1474]: time="2024-04-12T21:46:59.432428644Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:46:59.432477 env[1474]: time="2024-04-12T21:46:59.432435475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:46:59.432642 env[1474]: time="2024-04-12T21:46:59.432501363Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41 pid=4595 runtime=io.containerd.runc.v2 Apr 12 21:46:59.432000 audit[4600]: NETFILTER_CFG table=filter:109 family=2 entries=50 op=nft_register_chain pid=4600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:46:59.432000 audit[4600]: SYSCALL arch=c000003e syscall=46 success=yes exit=25632 a0=3 a1=7ffe53cf35c0 a2=0 a3=7ffe53cf35ac items=0 ppid=3836 pid=4600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:46:59.438053 systemd[1]: Started cri-containerd-40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41.scope. Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit: BPF prog-id=168 op=LOAD Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653661336363653164646462356263396332373434666639343231 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653661336363653164646462356263396332373434666639343231 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit: BPF prog-id=169 op=LOAD Apr 12 21:46:59.443000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002bddc0 items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653661336363653164646462356263396332373434666639343231 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit: BPF prog-id=170 op=LOAD Apr 12 21:46:59.443000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002bde08 items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653661336363653164646462356263396332373434666639343231 Apr 12 21:46:59.443000 audit: BPF prog-id=170 op=UNLOAD Apr 12 21:46:59.443000 audit: BPF prog-id=169 op=UNLOAD Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:46:59.443000 audit: BPF prog-id=171 op=LOAD Apr 12 21:46:59.443000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00040c218 items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:46:59.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653661336363653164646462356263396332373434666639343231 Apr 12 21:46:59.448767 env[1474]: time="2024-04-12T21:46:59.448741348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bnhfc,Uid:589877c5-c6c3-4951-9e7e-7b8f65a7589c,Namespace:calico-system,Attempt:1,} returns sandbox id \"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41\"" Apr 12 21:46:59.449502 env[1474]: time="2024-04-12T21:46:59.449488748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 21:46:59.551529 systemd-networkd[1320]: cali2b4af930120: Gained IPv6LL Apr 12 21:47:00.092879 kubelet[2565]: I0412 21:47:00.092737 2565 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:47:00.107824 env[1474]: time="2024-04-12T21:47:00.107740167Z" level=info msg="StopPodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\"" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.132 [INFO][4652] k8s.go 585: Cleaning up netns ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.132 [INFO][4652] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" iface="eth0" netns="/var/run/netns/cni-34779e66-e20a-1eb3-1033-5bb4daf7878c" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.133 [INFO][4652] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" iface="eth0" netns="/var/run/netns/cni-34779e66-e20a-1eb3-1033-5bb4daf7878c" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.133 [INFO][4652] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" iface="eth0" netns="/var/run/netns/cni-34779e66-e20a-1eb3-1033-5bb4daf7878c" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.133 [INFO][4652] k8s.go 592: Releasing IP address(es) ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.133 [INFO][4652] utils.go 188: Calico CNI releasing IP address ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.144 [INFO][4688] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.144 [INFO][4688] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.144 [INFO][4688] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.149 [WARNING][4688] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.149 [INFO][4688] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.151 [INFO][4688] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:00.152556 env[1474]: 2024-04-12 21:47:00.151 [INFO][4652] k8s.go 598: Teardown processing complete. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:00.152911 env[1474]: time="2024-04-12T21:47:00.152640611Z" level=info msg="TearDown network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" successfully" Apr 12 21:47:00.152911 env[1474]: time="2024-04-12T21:47:00.152672525Z" level=info msg="StopPodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" returns successfully" Apr 12 21:47:00.153175 env[1474]: time="2024-04-12T21:47:00.153128871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565bdc4d65-2t2c8,Uid:69ba74ab-daf7-4f87-b177-c93b5873a24f,Namespace:calico-system,Attempt:1,}" Apr 12 21:47:00.164738 systemd[1]: run-netns-cni\x2d34779e66\x2de20a\x2d1eb3\x2d1033\x2d5bb4daf7878c.mount: Deactivated successfully. Apr 12 21:47:00.236635 systemd-networkd[1320]: cali51db75d729d: Link UP Apr 12 21:47:00.264255 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali51db75d729d: link becomes ready Apr 12 21:47:00.264370 systemd-networkd[1320]: cali51db75d729d: Gained carrier Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.194 [INFO][4735] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0 calico-kube-controllers-565bdc4d65- calico-system 69ba74ab-daf7-4f87-b177-c93b5873a24f 745 0 2024-04-12 21:46:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:565bdc4d65 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-26e8ad9098 calico-kube-controllers-565bdc4d65-2t2c8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali51db75d729d [] []}} ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.195 [INFO][4735] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.211 [INFO][4756] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" HandleID="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.218 [INFO][4756] ipam_plugin.go 268: Auto assigning IP ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" HandleID="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00065c9a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-26e8ad9098", "pod":"calico-kube-controllers-565bdc4d65-2t2c8", "timestamp":"2024-04-12 21:47:00.211596304 +0000 UTC"}, Hostname:"ci-3510.3.3-a-26e8ad9098", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.218 [INFO][4756] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.218 [INFO][4756] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.218 [INFO][4756] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-26e8ad9098' Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.219 [INFO][4756] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.222 [INFO][4756] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.225 [INFO][4756] ipam.go 489: Trying affinity for 192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.226 [INFO][4756] ipam.go 155: Attempting to load block cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.228 [INFO][4756] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.228 [INFO][4756] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.192/26 handle="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.229 [INFO][4756] ipam.go 1682: Creating new handle: k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824 Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.231 [INFO][4756] ipam.go 1203: Writing block in order to claim IPs block=192.168.43.192/26 handle="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.234 [INFO][4756] ipam.go 1216: Successfully claimed IPs: [192.168.43.196/26] block=192.168.43.192/26 handle="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.234 [INFO][4756] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.196/26] handle="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.234 [INFO][4756] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:00.269958 env[1474]: 2024-04-12 21:47:00.234 [INFO][4756] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.43.196/26] IPv6=[] ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" HandleID="k8s-pod-network.d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.270592 env[1474]: 2024-04-12 21:47:00.235 [INFO][4735] k8s.go 385: Populated endpoint ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0", GenerateName:"calico-kube-controllers-565bdc4d65-", Namespace:"calico-system", SelfLink:"", UID:"69ba74ab-daf7-4f87-b177-c93b5873a24f", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565bdc4d65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"", Pod:"calico-kube-controllers-565bdc4d65-2t2c8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali51db75d729d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:00.270592 env[1474]: 2024-04-12 21:47:00.235 [INFO][4735] k8s.go 386: Calico CNI using IPs: [192.168.43.196/32] ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.270592 env[1474]: 2024-04-12 21:47:00.235 [INFO][4735] dataplane_linux.go 68: Setting the host side veth name to cali51db75d729d ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.270592 env[1474]: 2024-04-12 21:47:00.264 [INFO][4735] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.270592 env[1474]: 2024-04-12 21:47:00.264 [INFO][4735] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0", GenerateName:"calico-kube-controllers-565bdc4d65-", Namespace:"calico-system", SelfLink:"", UID:"69ba74ab-daf7-4f87-b177-c93b5873a24f", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565bdc4d65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824", Pod:"calico-kube-controllers-565bdc4d65-2t2c8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali51db75d729d", MAC:"3a:e5:bd:ea:51:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:00.270592 env[1474]: 2024-04-12 21:47:00.268 [INFO][4735] k8s.go 498: Wrote updated endpoint to datastore ContainerID="d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824" Namespace="calico-system" Pod="calico-kube-controllers-565bdc4d65-2t2c8" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:00.275745 env[1474]: time="2024-04-12T21:47:00.275705465Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:47:00.275745 env[1474]: time="2024-04-12T21:47:00.275727648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:47:00.275745 env[1474]: time="2024-04-12T21:47:00.275734459Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:47:00.275916 env[1474]: time="2024-04-12T21:47:00.275800988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824 pid=4798 runtime=io.containerd.runc.v2 Apr 12 21:47:00.275000 audit[4804]: NETFILTER_CFG table=filter:110 family=2 entries=38 op=nft_register_chain pid=4804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:47:00.275000 audit[4804]: SYSCALL arch=c000003e syscall=46 success=yes exit=19848 a0=3 a1=7ffcc313dfb0 a2=0 a3=7ffcc313df9c items=0 ppid=3836 pid=4804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.275000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:47:00.282298 systemd[1]: Started cri-containerd-d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824.scope. Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.285000 audit: BPF prog-id=172 op=LOAD Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4798 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303439643331383539396265643035343532306161646639383237 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4798 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303439643331383539396265643035343532306161646639383237 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit: BPF prog-id=173 op=LOAD Apr 12 21:47:00.286000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001dbae0 items=0 ppid=4798 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303439643331383539396265643035343532306161646639383237 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit: BPF prog-id=174 op=LOAD Apr 12 21:47:00.286000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001dbb28 items=0 ppid=4798 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303439643331383539396265643035343532306161646639383237 Apr 12 21:47:00.286000 audit: BPF prog-id=174 op=UNLOAD Apr 12 21:47:00.286000 audit: BPF prog-id=173 op=UNLOAD Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { perfmon } for pid=4809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit[4809]: AVC avc: denied { bpf } for pid=4809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:00.286000 audit: BPF prog-id=175 op=LOAD Apr 12 21:47:00.286000 audit[4809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001dbf38 items=0 ppid=4798 pid=4809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434303439643331383539396265643035343532306161646639383237 Apr 12 21:47:00.298000 audit[4827]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:00.298000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed3a52030 a2=0 a3=7ffed3a5201c items=0 ppid=2819 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:00.302813 env[1474]: time="2024-04-12T21:47:00.302760351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-565bdc4d65-2t2c8,Uid:69ba74ab-daf7-4f87-b177-c93b5873a24f,Namespace:calico-system,Attempt:1,} returns sandbox id \"d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824\"" Apr 12 21:47:00.312000 audit[4827]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:00.312000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffed3a52030 a2=0 a3=7ffed3a5201c items=0 ppid=2819 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:00.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:01.279352 systemd-networkd[1320]: cali51db75d729d: Gained IPv6LL Apr 12 21:47:01.452161 env[1474]: time="2024-04-12T21:47:01.452107873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:01.452720 env[1474]: time="2024-04-12T21:47:01.452679318Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:01.453421 env[1474]: time="2024-04-12T21:47:01.453379590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:01.454560 env[1474]: time="2024-04-12T21:47:01.454518755Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:01.454806 env[1474]: time="2024-04-12T21:47:01.454764878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 21:47:01.455104 env[1474]: time="2024-04-12T21:47:01.455091820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 21:47:01.456027 env[1474]: time="2024-04-12T21:47:01.456005373Z" level=info msg="CreateContainer within sandbox \"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 21:47:01.461510 env[1474]: time="2024-04-12T21:47:01.461465886Z" level=info msg="CreateContainer within sandbox \"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"261e8d5c4a9afa90b3d90de8656ac52ab6c49f83cba2fcfa636cd53bd1c1bfd5\"" Apr 12 21:47:01.461744 env[1474]: time="2024-04-12T21:47:01.461729472Z" level=info msg="StartContainer for \"261e8d5c4a9afa90b3d90de8656ac52ab6c49f83cba2fcfa636cd53bd1c1bfd5\"" Apr 12 21:47:01.470590 systemd[1]: Started cri-containerd-261e8d5c4a9afa90b3d90de8656ac52ab6c49f83cba2fcfa636cd53bd1c1bfd5.scope. Apr 12 21:47:01.471285 systemd-networkd[1320]: cali587409aefdf: Gained IPv6LL Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f92834edee8 items=0 ppid=4595 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:01.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236316538643563346139616661393062336439306465383635366163 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit: BPF prog-id=176 op=LOAD Apr 12 21:47:01.476000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d42d8 items=0 ppid=4595 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:01.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236316538643563346139616661393062336439306465383635366163 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit: BPF prog-id=177 op=LOAD Apr 12 21:47:01.476000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d4328 items=0 ppid=4595 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:01.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236316538643563346139616661393062336439306465383635366163 Apr 12 21:47:01.476000 audit: BPF prog-id=177 op=UNLOAD Apr 12 21:47:01.476000 audit: BPF prog-id=176 op=UNLOAD Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:01.476000 audit: BPF prog-id=178 op=LOAD Apr 12 21:47:01.476000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d43b8 items=0 ppid=4595 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:01.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236316538643563346139616661393062336439306465383635366163 Apr 12 21:47:01.483472 env[1474]: time="2024-04-12T21:47:01.483445136Z" level=info msg="StartContainer for \"261e8d5c4a9afa90b3d90de8656ac52ab6c49f83cba2fcfa636cd53bd1c1bfd5\" returns successfully" Apr 12 21:47:02.287387 systemd[1]: Started sshd@7-145.40.90.149:22-149.202.90.68:43828.service. Apr 12 21:47:02.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.90.149:22-149.202.90.68:43828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:47:03.063282 sshd[4873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.90.68 user=root Apr 12 21:47:03.062000 audit[4873]: USER_AUTH pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=149.202.90.68 addr=149.202.90.68 terminal=ssh res=failed' Apr 12 21:47:03.103467 kernel: kauditd_printk_skb: 412 callbacks suppressed Apr 12 21:47:03.103569 kernel: audit: type=1100 audit(1712958423.062:1304): pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=149.202.90.68 addr=149.202.90.68 terminal=ssh res=failed' Apr 12 21:47:04.612828 env[1474]: time="2024-04-12T21:47:04.612800980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:04.613395 env[1474]: time="2024-04-12T21:47:04.613381741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:04.614446 env[1474]: time="2024-04-12T21:47:04.614435144Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:04.615943 env[1474]: time="2024-04-12T21:47:04.615902845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:04.616357 env[1474]: time="2024-04-12T21:47:04.616310601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 21:47:04.616744 env[1474]: time="2024-04-12T21:47:04.616732627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 21:47:04.620656 env[1474]: time="2024-04-12T21:47:04.620618637Z" level=info msg="CreateContainer within sandbox \"d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 21:47:04.625130 env[1474]: time="2024-04-12T21:47:04.625113497Z" level=info msg="CreateContainer within sandbox \"d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"905838882f6e82977ca9187c17e744f01aa9ebc2fdcb0327dadc0f8c0a945120\"" Apr 12 21:47:04.625464 env[1474]: time="2024-04-12T21:47:04.625425472Z" level=info msg="StartContainer for \"905838882f6e82977ca9187c17e744f01aa9ebc2fdcb0327dadc0f8c0a945120\"" Apr 12 21:47:04.633816 systemd[1]: Started cri-containerd-905838882f6e82977ca9187c17e744f01aa9ebc2fdcb0327dadc0f8c0a945120.scope. Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.762534 kernel: audit: type=1400 audit(1712958424.640:1305): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.762614 kernel: audit: type=1400 audit(1712958424.640:1306): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.762634 kernel: audit: type=1400 audit(1712958424.640:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822926 kernel: audit: type=1400 audit(1712958424.640:1308): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.840297 sshd[4873]: Failed password for root from 149.202.90.68 port 43828 ssh2 Apr 12 21:47:04.883916 kernel: audit: type=1400 audit(1712958424.640:1309): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.005461 kernel: audit: type=1400 audit(1712958424.640:1310): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.005519 kernel: audit: type=1400 audit(1712958424.640:1311): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066286 kernel: audit: type=1400 audit(1712958424.640:1312): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.127629 kernel: audit: type=1400 audit(1712958424.640:1313): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.821000 audit: BPF prog-id=179 op=LOAD Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4798 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:04.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353833383838326636653832393737636139313837633137653734 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4798 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:04.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353833383838326636653832393737636139313837633137653734 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.822000 audit: BPF prog-id=180 op=LOAD Apr 12 21:47:04.822000 audit[4896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00035e2a0 items=0 ppid=4798 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:04.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353833383838326636653832393737636139313837633137653734 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:04.943000 audit: BPF prog-id=181 op=LOAD Apr 12 21:47:04.943000 audit[4896]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00035e2e8 items=0 ppid=4798 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:04.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353833383838326636653832393737636139313837633137653734 Apr 12 21:47:05.066000 audit: BPF prog-id=181 op=UNLOAD Apr 12 21:47:05.066000 audit: BPF prog-id=180 op=UNLOAD Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { perfmon } for pid=4896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit[4896]: AVC avc: denied { bpf } for pid=4896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:05.066000 audit: BPF prog-id=182 op=LOAD Apr 12 21:47:05.066000 audit[4896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035e6f8 items=0 ppid=4798 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:05.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353833383838326636653832393737636139313837633137653734 Apr 12 21:47:05.205912 env[1474]: time="2024-04-12T21:47:05.205889656Z" level=info msg="StartContainer for \"905838882f6e82977ca9187c17e744f01aa9ebc2fdcb0327dadc0f8c0a945120\" returns successfully" Apr 12 21:47:05.216852 sshd[4873]: Connection closed by authenticating user root 149.202.90.68 port 43828 [preauth] Apr 12 21:47:05.217496 systemd[1]: sshd@7-145.40.90.149:22-149.202.90.68:43828.service: Deactivated successfully. Apr 12 21:47:05.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.90.149:22-149.202.90.68:43828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:47:05.305172 kubelet[2565]: I0412 21:47:05.305106 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-565bdc4d65-2t2c8" podStartSLOduration=30.991829141 podCreationTimestamp="2024-04-12 21:46:30 +0000 UTC" firstStartedPulling="2024-04-12 21:47:00.303368009 +0000 UTC m=+48.250675200" lastFinishedPulling="2024-04-12 21:47:04.616499714 +0000 UTC m=+52.563806898" observedRunningTime="2024-04-12 21:47:05.303488119 +0000 UTC m=+53.250795404" watchObservedRunningTime="2024-04-12 21:47:05.304960839 +0000 UTC m=+53.252268085" Apr 12 21:47:06.860471 env[1474]: time="2024-04-12T21:47:06.860409351Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:06.861044 env[1474]: time="2024-04-12T21:47:06.861000710Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:06.861614 env[1474]: time="2024-04-12T21:47:06.861568711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:06.862671 env[1474]: time="2024-04-12T21:47:06.862631210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:06.862855 env[1474]: time="2024-04-12T21:47:06.862811121Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 21:47:06.863860 env[1474]: time="2024-04-12T21:47:06.863846271Z" level=info msg="CreateContainer within sandbox \"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 21:47:06.869859 env[1474]: time="2024-04-12T21:47:06.869814886Z" level=info msg="CreateContainer within sandbox \"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4a2a6e911e9e37a27c8353094d458527736effcb774fe59ecd47a36b1c6b4b33\"" Apr 12 21:47:06.870166 env[1474]: time="2024-04-12T21:47:06.870153460Z" level=info msg="StartContainer for \"4a2a6e911e9e37a27c8353094d458527736effcb774fe59ecd47a36b1c6b4b33\"" Apr 12 21:47:06.881022 systemd[1]: Started cri-containerd-4a2a6e911e9e37a27c8353094d458527736effcb774fe59ecd47a36b1c6b4b33.scope. Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd4fa01fdc8 items=0 ppid=4595 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:06.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326136653931316539653337613237633833353330393464343538 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit: BPF prog-id=183 op=LOAD Apr 12 21:47:06.887000 audit[4969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00037c4f8 items=0 ppid=4595 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:06.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326136653931316539653337613237633833353330393464343538 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit: BPF prog-id=184 op=LOAD Apr 12 21:47:06.887000 audit[4969]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00037c548 items=0 ppid=4595 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:06.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326136653931316539653337613237633833353330393464343538 Apr 12 21:47:06.887000 audit: BPF prog-id=184 op=UNLOAD Apr 12 21:47:06.887000 audit: BPF prog-id=183 op=UNLOAD Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { perfmon } for pid=4969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit[4969]: AVC avc: denied { bpf } for pid=4969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:06.887000 audit: BPF prog-id=185 op=LOAD Apr 12 21:47:06.887000 audit[4969]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00037c5d8 items=0 ppid=4595 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:06.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461326136653931316539653337613237633833353330393464343538 Apr 12 21:47:06.893139 env[1474]: time="2024-04-12T21:47:06.893113799Z" level=info msg="StartContainer for \"4a2a6e911e9e37a27c8353094d458527736effcb774fe59ecd47a36b1c6b4b33\" returns successfully" Apr 12 21:47:07.159385 kubelet[2565]: I0412 21:47:07.159182 2565 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 21:47:07.159385 kubelet[2565]: I0412 21:47:07.159269 2565 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 21:47:07.316415 kubelet[2565]: I0412 21:47:07.316355 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-bnhfc" podStartSLOduration=29.902541587 podCreationTimestamp="2024-04-12 21:46:30 +0000 UTC" firstStartedPulling="2024-04-12 21:46:59.449321332 +0000 UTC m=+47.396628513" lastFinishedPulling="2024-04-12 21:47:06.86304444 +0000 UTC m=+54.810351625" observedRunningTime="2024-04-12 21:47:07.31546101 +0000 UTC m=+55.262768277" watchObservedRunningTime="2024-04-12 21:47:07.316264699 +0000 UTC m=+55.263571934" Apr 12 21:47:08.026000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.026000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00145f8c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:47:08.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:08.026000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.026000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b0dd00 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:47:08.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.122528 kernel: kauditd_printk_skb: 98 callbacks suppressed Apr 12 21:47:08.122577 kernel: audit: type=1400 audit(1712958428.094:1332): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0091200a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.308925 kernel: audit: type=1300 audit(1712958428.094:1332): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0091200a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.308993 kernel: audit: type=1327 audit(1712958428.094:1332): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.400161 kernel: audit: type=1400 audit(1712958428.094:1333): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.489064 kernel: audit: type=1300 audit(1712958428.094:1333): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0048e8390 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0048e8390 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.584707 kernel: audit: type=1327 audit(1712958428.094:1333): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.675209 kernel: audit: type=1400 audit(1712958428.094:1334): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.763140 kernel: audit: type=1300 audit(1712958428.094:1334): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0074e9320 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0074e9320 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.860723 kernel: audit: type=1327 audit(1712958428.094:1334): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.954910 kernel: audit: type=1400 audit(1712958428.094:1335): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.094000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.094000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c011207aa0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c011106330 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c003655860 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:47:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:47:09.868000 audit[4998]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:09.868000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdf0a544d0 a2=0 a3=7ffdf0a544bc items=0 ppid=2819 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:09.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:09.870802 kubelet[2565]: I0412 21:47:09.870765 2565 topology_manager.go:215] "Topology Admit Handler" podUID="93e0fd70-2ff9-438b-af74-48669be39bcc" podNamespace="calico-apiserver" podName="calico-apiserver-7d44db4b69-hqgcc" Apr 12 21:47:09.876262 kubelet[2565]: I0412 21:47:09.876212 2565 topology_manager.go:215] "Topology Admit Handler" podUID="e4c36c3d-5016-4af6-b66e-fd8a5a1e9546" podNamespace="calico-apiserver" podName="calico-apiserver-7d44db4b69-n5rv9" Apr 12 21:47:09.877755 systemd[1]: Created slice kubepods-besteffort-pod93e0fd70_2ff9_438b_af74_48669be39bcc.slice. Apr 12 21:47:09.870000 audit[4998]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:09.870000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf0a544d0 a2=0 a3=7ffdf0a544bc items=0 ppid=2819 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:09.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:09.883399 systemd[1]: Created slice kubepods-besteffort-pode4c36c3d_5016_4af6_b66e_fd8a5a1e9546.slice. Apr 12 21:47:09.883000 audit[5000]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:09.883000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffa096cab0 a2=0 a3=7fffa096ca9c items=0 ppid=2819 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:09.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:09.885000 audit[5000]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:09.885000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa096cab0 a2=0 a3=7fffa096ca9c items=0 ppid=2819 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:09.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:10.016884 kubelet[2565]: I0412 21:47:10.016784 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lnbvw\" (UniqueName: \"kubernetes.io/projected/93e0fd70-2ff9-438b-af74-48669be39bcc-kube-api-access-lnbvw\") pod \"calico-apiserver-7d44db4b69-hqgcc\" (UID: \"93e0fd70-2ff9-438b-af74-48669be39bcc\") " pod="calico-apiserver/calico-apiserver-7d44db4b69-hqgcc" Apr 12 21:47:10.017144 kubelet[2565]: I0412 21:47:10.016967 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e4c36c3d-5016-4af6-b66e-fd8a5a1e9546-calico-apiserver-certs\") pod \"calico-apiserver-7d44db4b69-n5rv9\" (UID: \"e4c36c3d-5016-4af6-b66e-fd8a5a1e9546\") " pod="calico-apiserver/calico-apiserver-7d44db4b69-n5rv9" Apr 12 21:47:10.017144 kubelet[2565]: I0412 21:47:10.017113 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/93e0fd70-2ff9-438b-af74-48669be39bcc-calico-apiserver-certs\") pod \"calico-apiserver-7d44db4b69-hqgcc\" (UID: \"93e0fd70-2ff9-438b-af74-48669be39bcc\") " pod="calico-apiserver/calico-apiserver-7d44db4b69-hqgcc" Apr 12 21:47:10.017443 kubelet[2565]: I0412 21:47:10.017285 2565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5nd6\" (UniqueName: \"kubernetes.io/projected/e4c36c3d-5016-4af6-b66e-fd8a5a1e9546-kube-api-access-k5nd6\") pod \"calico-apiserver-7d44db4b69-n5rv9\" (UID: \"e4c36c3d-5016-4af6-b66e-fd8a5a1e9546\") " pod="calico-apiserver/calico-apiserver-7d44db4b69-n5rv9" Apr 12 21:47:10.118039 kubelet[2565]: E0412 21:47:10.117912 2565 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 21:47:10.118039 kubelet[2565]: E0412 21:47:10.118000 2565 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 21:47:10.118575 kubelet[2565]: E0412 21:47:10.118099 2565 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/93e0fd70-2ff9-438b-af74-48669be39bcc-calico-apiserver-certs podName:93e0fd70-2ff9-438b-af74-48669be39bcc nodeName:}" failed. No retries permitted until 2024-04-12 21:47:10.618050667 +0000 UTC m=+58.565357918 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/93e0fd70-2ff9-438b-af74-48669be39bcc-calico-apiserver-certs") pod "calico-apiserver-7d44db4b69-hqgcc" (UID: "93e0fd70-2ff9-438b-af74-48669be39bcc") : secret "calico-apiserver-certs" not found Apr 12 21:47:10.118575 kubelet[2565]: E0412 21:47:10.118157 2565 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e4c36c3d-5016-4af6-b66e-fd8a5a1e9546-calico-apiserver-certs podName:e4c36c3d-5016-4af6-b66e-fd8a5a1e9546 nodeName:}" failed. No retries permitted until 2024-04-12 21:47:10.618127737 +0000 UTC m=+58.565434972 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e4c36c3d-5016-4af6-b66e-fd8a5a1e9546-calico-apiserver-certs") pod "calico-apiserver-7d44db4b69-n5rv9" (UID: "e4c36c3d-5016-4af6-b66e-fd8a5a1e9546") : secret "calico-apiserver-certs" not found Apr 12 21:47:10.782013 env[1474]: time="2024-04-12T21:47:10.781883953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d44db4b69-hqgcc,Uid:93e0fd70-2ff9-438b-af74-48669be39bcc,Namespace:calico-apiserver,Attempt:0,}" Apr 12 21:47:10.785879 env[1474]: time="2024-04-12T21:47:10.785800438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d44db4b69-n5rv9,Uid:e4c36c3d-5016-4af6-b66e-fd8a5a1e9546,Namespace:calico-apiserver,Attempt:0,}" Apr 12 21:47:10.850950 systemd-networkd[1320]: cali355487a41fd: Link UP Apr 12 21:47:10.907538 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:47:10.907636 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali355487a41fd: link becomes ready Apr 12 21:47:10.907594 systemd-networkd[1320]: cali355487a41fd: Gained carrier Apr 12 21:47:10.908105 systemd-networkd[1320]: cali3aad5a82b8f: Link UP Apr 12 21:47:10.908236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3aad5a82b8f: link becomes ready Apr 12 21:47:10.910000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:10.910000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010eed20 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:47:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:10.910000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:10.910000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010eed40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:47:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:10.911000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:10.911000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1c7e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:47:10.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.809 [INFO][5008] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0 calico-apiserver-7d44db4b69- calico-apiserver 93e0fd70-2ff9-438b-af74-48669be39bcc 833 0 2024-04-12 21:47:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d44db4b69 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-26e8ad9098 calico-apiserver-7d44db4b69-hqgcc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali355487a41fd [] []}} ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.809 [INFO][5008] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.825 [INFO][5053] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" HandleID="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.831 [INFO][5053] ipam_plugin.go 268: Auto assigning IP ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" HandleID="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029de70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-26e8ad9098", "pod":"calico-apiserver-7d44db4b69-hqgcc", "timestamp":"2024-04-12 21:47:10.825234885 +0000 UTC"}, Hostname:"ci-3510.3.3-a-26e8ad9098", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.831 [INFO][5053] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.831 [INFO][5053] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.831 [INFO][5053] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-26e8ad9098' Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.832 [INFO][5053] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.835 [INFO][5053] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.838 [INFO][5053] ipam.go 489: Trying affinity for 192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.839 [INFO][5053] ipam.go 155: Attempting to load block cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.841 [INFO][5053] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.841 [INFO][5053] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.192/26 handle="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.843 [INFO][5053] ipam.go 1682: Creating new handle: k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.845 [INFO][5053] ipam.go 1203: Writing block in order to claim IPs block=192.168.43.192/26 handle="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.849 [INFO][5053] ipam.go 1216: Successfully claimed IPs: [192.168.43.197/26] block=192.168.43.192/26 handle="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.849 [INFO][5053] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.197/26] handle="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.849 [INFO][5053] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:10.912750 env[1474]: 2024-04-12 21:47:10.849 [INFO][5053] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.43.197/26] IPv6=[] ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" HandleID="k8s-pod-network.d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.913170 env[1474]: 2024-04-12 21:47:10.850 [INFO][5008] k8s.go 385: Populated endpoint ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0", GenerateName:"calico-apiserver-7d44db4b69-", Namespace:"calico-apiserver", SelfLink:"", UID:"93e0fd70-2ff9-438b-af74-48669be39bcc", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 47, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d44db4b69", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"", Pod:"calico-apiserver-7d44db4b69-hqgcc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali355487a41fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:10.913170 env[1474]: 2024-04-12 21:47:10.850 [INFO][5008] k8s.go 386: Calico CNI using IPs: [192.168.43.197/32] ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.913170 env[1474]: 2024-04-12 21:47:10.850 [INFO][5008] dataplane_linux.go 68: Setting the host side veth name to cali355487a41fd ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.913170 env[1474]: 2024-04-12 21:47:10.907 [INFO][5008] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.913170 env[1474]: 2024-04-12 21:47:10.907 [INFO][5008] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0", GenerateName:"calico-apiserver-7d44db4b69-", Namespace:"calico-apiserver", SelfLink:"", UID:"93e0fd70-2ff9-438b-af74-48669be39bcc", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 47, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d44db4b69", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e", Pod:"calico-apiserver-7d44db4b69-hqgcc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali355487a41fd", MAC:"7e:6e:b7:08:99:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:10.913170 env[1474]: 2024-04-12 21:47:10.911 [INFO][5008] k8s.go 498: Wrote updated endpoint to datastore ContainerID="d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-hqgcc" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--hqgcc-eth0" Apr 12 21:47:10.912000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:47:10.912000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001627360 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:47:10.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:47:10.918872 env[1474]: time="2024-04-12T21:47:10.918816709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:47:10.918872 env[1474]: time="2024-04-12T21:47:10.918846523Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:47:10.918872 env[1474]: time="2024-04-12T21:47:10.918853664Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:47:10.919047 env[1474]: time="2024-04-12T21:47:10.918926691Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e pid=5115 runtime=io.containerd.runc.v2 Apr 12 21:47:10.921000 audit[5133]: NETFILTER_CFG table=filter:117 family=2 entries=51 op=nft_register_chain pid=5133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:47:10.921000 audit[5133]: SYSCALL arch=c000003e syscall=46 success=yes exit=27748 a0=3 a1=7ffebf0b4100 a2=0 a3=7ffebf0b40ec items=0 ppid=3836 pid=5133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.921000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:47:10.924532 systemd[1]: Started cri-containerd-d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e.scope. Apr 12 21:47:10.936594 systemd-networkd[1320]: cali3aad5a82b8f: Gained carrier Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit: BPF prog-id=186 op=LOAD Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5115 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434316232656235353662303938306234306162373336363338666439 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5115 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434316232656235353662303938306234306162373336363338666439 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit: BPF prog-id=187 op=LOAD Apr 12 21:47:10.943000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d83b0 items=0 ppid=5115 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434316232656235353662303938306234306162373336363338666439 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit: BPF prog-id=188 op=LOAD Apr 12 21:47:10.943000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d83f8 items=0 ppid=5115 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434316232656235353662303938306234306162373336363338666439 Apr 12 21:47:10.943000 audit: BPF prog-id=188 op=UNLOAD Apr 12 21:47:10.943000 audit: BPF prog-id=187 op=UNLOAD Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { perfmon } for pid=5127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit[5127]: AVC avc: denied { bpf } for pid=5127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.943000 audit: BPF prog-id=189 op=LOAD Apr 12 21:47:10.943000 audit[5127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d8808 items=0 ppid=5115 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434316232656235353662303938306234306162373336363338666439 Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.809 [INFO][5018] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0 calico-apiserver-7d44db4b69- calico-apiserver e4c36c3d-5016-4af6-b66e-fd8a5a1e9546 836 0 2024-04-12 21:47:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d44db4b69 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-26e8ad9098 calico-apiserver-7d44db4b69-n5rv9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3aad5a82b8f [] []}} ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.809 [INFO][5018] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.825 [INFO][5058] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" HandleID="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.832 [INFO][5058] ipam_plugin.go 268: Auto assigning IP ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" HandleID="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bfea0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-26e8ad9098", "pod":"calico-apiserver-7d44db4b69-n5rv9", "timestamp":"2024-04-12 21:47:10.825604193 +0000 UTC"}, Hostname:"ci-3510.3.3-a-26e8ad9098", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.832 [INFO][5058] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.849 [INFO][5058] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.849 [INFO][5058] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-26e8ad9098' Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.850 [INFO][5058] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.853 [INFO][5058] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.856 [INFO][5058] ipam.go 489: Trying affinity for 192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.857 [INFO][5058] ipam.go 155: Attempting to load block cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.859 [INFO][5058] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.192/26 host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.859 [INFO][5058] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.192/26 handle="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.860 [INFO][5058] ipam.go 1682: Creating new handle: k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939 Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.862 [INFO][5058] ipam.go 1203: Writing block in order to claim IPs block=192.168.43.192/26 handle="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.865 [INFO][5058] ipam.go 1216: Successfully claimed IPs: [192.168.43.198/26] block=192.168.43.192/26 handle="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.865 [INFO][5058] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.198/26] handle="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" host="ci-3510.3.3-a-26e8ad9098" Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.865 [INFO][5058] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:10.952618 env[1474]: 2024-04-12 21:47:10.865 [INFO][5058] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.43.198/26] IPv6=[] ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" HandleID="k8s-pod-network.6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.953087 env[1474]: 2024-04-12 21:47:10.866 [INFO][5018] k8s.go 385: Populated endpoint ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0", GenerateName:"calico-apiserver-7d44db4b69-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4c36c3d-5016-4af6-b66e-fd8a5a1e9546", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 47, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d44db4b69", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"", Pod:"calico-apiserver-7d44db4b69-n5rv9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3aad5a82b8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:10.953087 env[1474]: 2024-04-12 21:47:10.866 [INFO][5018] k8s.go 386: Calico CNI using IPs: [192.168.43.198/32] ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.953087 env[1474]: 2024-04-12 21:47:10.866 [INFO][5018] dataplane_linux.go 68: Setting the host side veth name to cali3aad5a82b8f ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.953087 env[1474]: 2024-04-12 21:47:10.936 [INFO][5018] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.953087 env[1474]: 2024-04-12 21:47:10.947 [INFO][5018] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0", GenerateName:"calico-apiserver-7d44db4b69-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4c36c3d-5016-4af6-b66e-fd8a5a1e9546", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 47, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d44db4b69", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939", Pod:"calico-apiserver-7d44db4b69-n5rv9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3aad5a82b8f", MAC:"2e:41:ae:83:e6:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:10.953087 env[1474]: 2024-04-12 21:47:10.951 [INFO][5018] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939" Namespace="calico-apiserver" Pod="calico-apiserver-7d44db4b69-n5rv9" WorkloadEndpoint="ci--3510.3.3--a--26e8ad9098-k8s-calico--apiserver--7d44db4b69--n5rv9-eth0" Apr 12 21:47:10.957000 audit[5158]: NETFILTER_CFG table=filter:118 family=2 entries=48 op=nft_register_chain pid=5158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:47:10.957000 audit[5158]: SYSCALL arch=c000003e syscall=46 success=yes exit=25540 a0=3 a1=7ffdab720790 a2=0 a3=7ffdab72077c items=0 ppid=3836 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.957000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:47:10.960849 env[1474]: time="2024-04-12T21:47:10.960814019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d44db4b69-hqgcc,Uid:93e0fd70-2ff9-438b-af74-48669be39bcc,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e\"" Apr 12 21:47:10.961570 env[1474]: time="2024-04-12T21:47:10.961533562Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 21:47:10.971661 env[1474]: time="2024-04-12T21:47:10.971601054Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:47:10.971661 env[1474]: time="2024-04-12T21:47:10.971622096Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:47:10.971661 env[1474]: time="2024-04-12T21:47:10.971629082Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:47:10.971786 env[1474]: time="2024-04-12T21:47:10.971687686Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939 pid=5171 runtime=io.containerd.runc.v2 Apr 12 21:47:10.977138 systemd[1]: Started cri-containerd-6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939.scope. Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit: BPF prog-id=190 op=LOAD Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013dc48 a2=10 a3=1c items=0 ppid=5171 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383331373633343439383937393531313630303264666137633962 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013d6b0 a2=3c a3=c items=0 ppid=5171 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383331373633343439383937393531313630303264666137633962 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit: BPF prog-id=191 op=LOAD Apr 12 21:47:10.982000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013d9d8 a2=78 a3=c0002c3dc0 items=0 ppid=5171 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383331373633343439383937393531313630303264666137633962 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit: BPF prog-id=192 op=LOAD Apr 12 21:47:10.982000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013d770 a2=78 a3=c0002c3e08 items=0 ppid=5171 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383331373633343439383937393531313630303264666137633962 Apr 12 21:47:10.982000 audit: BPF prog-id=192 op=UNLOAD Apr 12 21:47:10.982000 audit: BPF prog-id=191 op=UNLOAD Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:10.982000 audit: BPF prog-id=193 op=LOAD Apr 12 21:47:10.982000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013dc30 a2=78 a3=c0003ba218 items=0 ppid=5171 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631383331373633343439383937393531313630303264666137633962 Apr 12 21:47:10.999823 env[1474]: time="2024-04-12T21:47:10.999796657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d44db4b69-n5rv9,Uid:e4c36c3d-5016-4af6-b66e-fd8a5a1e9546,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939\"" Apr 12 21:47:12.104462 env[1474]: time="2024-04-12T21:47:12.104316809Z" level=info msg="StopPodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\"" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.129 [WARNING][5220] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05", Pod:"coredns-5dd5756b68-krszp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2b4af930120", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.129 [INFO][5220] k8s.go 585: Cleaning up netns ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.129 [INFO][5220] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" iface="eth0" netns="" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.129 [INFO][5220] k8s.go 592: Releasing IP address(es) ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.129 [INFO][5220] utils.go 188: Calico CNI releasing IP address ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.139 [INFO][5236] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.139 [INFO][5236] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.139 [INFO][5236] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.143 [WARNING][5236] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.143 [INFO][5236] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.144 [INFO][5236] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.145961 env[1474]: 2024-04-12 21:47:12.145 [INFO][5220] k8s.go 598: Teardown processing complete. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.146357 env[1474]: time="2024-04-12T21:47:12.145975346Z" level=info msg="TearDown network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" successfully" Apr 12 21:47:12.146357 env[1474]: time="2024-04-12T21:47:12.145993873Z" level=info msg="StopPodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" returns successfully" Apr 12 21:47:12.146357 env[1474]: time="2024-04-12T21:47:12.146247229Z" level=info msg="RemovePodSandbox for \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\"" Apr 12 21:47:12.146357 env[1474]: time="2024-04-12T21:47:12.146267798Z" level=info msg="Forcibly stopping sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\"" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.165 [WARNING][5266] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f792418e-23ed-453d-bb7c-dfc3aa0bf8c0", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"61b8c79009a32564c7f7460a64834ff1ebb2ca841e0902fe8495a0b55e06fa05", Pod:"coredns-5dd5756b68-krszp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2b4af930120", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.165 [INFO][5266] k8s.go 585: Cleaning up netns ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.165 [INFO][5266] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" iface="eth0" netns="" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.165 [INFO][5266] k8s.go 592: Releasing IP address(es) ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.165 [INFO][5266] utils.go 188: Calico CNI releasing IP address ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.177 [INFO][5282] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.177 [INFO][5282] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.177 [INFO][5282] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.181 [WARNING][5282] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.181 [INFO][5282] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" HandleID="k8s-pod-network.fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--krszp-eth0" Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.182 [INFO][5282] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.184025 env[1474]: 2024-04-12 21:47:12.183 [INFO][5266] k8s.go 598: Teardown processing complete. ContainerID="fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522" Apr 12 21:47:12.184409 env[1474]: time="2024-04-12T21:47:12.184041660Z" level=info msg="TearDown network for sandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" successfully" Apr 12 21:47:12.185838 env[1474]: time="2024-04-12T21:47:12.185822607Z" level=info msg="RemovePodSandbox \"fd0708031ff9914c41d5b9c2dda299cec651a18579486dea71461fed6afc2522\" returns successfully" Apr 12 21:47:12.186145 env[1474]: time="2024-04-12T21:47:12.186130121Z" level=info msg="StopPodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\"" Apr 12 21:47:12.223335 systemd-networkd[1320]: cali355487a41fd: Gained IPv6LL Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.208 [WARNING][5310] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e557205d-daea-4176-9feb-feb8f6cc6429", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca", Pod:"coredns-5dd5756b68-7wnhv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a86dafb195", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.209 [INFO][5310] k8s.go 585: Cleaning up netns ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.209 [INFO][5310] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" iface="eth0" netns="" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.209 [INFO][5310] k8s.go 592: Releasing IP address(es) ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.209 [INFO][5310] utils.go 188: Calico CNI releasing IP address ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.222 [INFO][5323] ipam_plugin.go 415: Releasing address using handleID ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.222 [INFO][5323] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.222 [INFO][5323] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.227 [WARNING][5323] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.227 [INFO][5323] ipam_plugin.go 443: Releasing address using workloadID ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.228 [INFO][5323] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.230336 env[1474]: 2024-04-12 21:47:12.229 [INFO][5310] k8s.go 598: Teardown processing complete. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.230764 env[1474]: time="2024-04-12T21:47:12.230382226Z" level=info msg="TearDown network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" successfully" Apr 12 21:47:12.230764 env[1474]: time="2024-04-12T21:47:12.230404421Z" level=info msg="StopPodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" returns successfully" Apr 12 21:47:12.230764 env[1474]: time="2024-04-12T21:47:12.230734249Z" level=info msg="RemovePodSandbox for \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\"" Apr 12 21:47:12.230842 env[1474]: time="2024-04-12T21:47:12.230756200Z" level=info msg="Forcibly stopping sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\"" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.255 [WARNING][5354] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"e557205d-daea-4176-9feb-feb8f6cc6429", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"91136d112e7e090aabd5779277752a523f05aa848d85791702e50769e93eb2ca", Pod:"coredns-5dd5756b68-7wnhv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a86dafb195", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.255 [INFO][5354] k8s.go 585: Cleaning up netns ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.255 [INFO][5354] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" iface="eth0" netns="" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.255 [INFO][5354] k8s.go 592: Releasing IP address(es) ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.255 [INFO][5354] utils.go 188: Calico CNI releasing IP address ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.268 [INFO][5369] ipam_plugin.go 415: Releasing address using handleID ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.269 [INFO][5369] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.269 [INFO][5369] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.274 [WARNING][5369] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.274 [INFO][5369] ipam_plugin.go 443: Releasing address using workloadID ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" HandleID="k8s-pod-network.387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Workload="ci--3510.3.3--a--26e8ad9098-k8s-coredns--5dd5756b68--7wnhv-eth0" Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.276 [INFO][5369] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.277855 env[1474]: 2024-04-12 21:47:12.276 [INFO][5354] k8s.go 598: Teardown processing complete. ContainerID="387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369" Apr 12 21:47:12.278415 env[1474]: time="2024-04-12T21:47:12.277855419Z" level=info msg="TearDown network for sandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" successfully" Apr 12 21:47:12.279806 env[1474]: time="2024-04-12T21:47:12.279759607Z" level=info msg="RemovePodSandbox \"387f4d00a0a2ba735079eedd821040cc50044be3695266514fb718397df3e369\" returns successfully" Apr 12 21:47:12.280140 env[1474]: time="2024-04-12T21:47:12.280117232Z" level=info msg="StopPodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\"" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.321 [WARNING][5400] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0", GenerateName:"calico-kube-controllers-565bdc4d65-", Namespace:"calico-system", SelfLink:"", UID:"69ba74ab-daf7-4f87-b177-c93b5873a24f", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565bdc4d65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824", Pod:"calico-kube-controllers-565bdc4d65-2t2c8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali51db75d729d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.322 [INFO][5400] k8s.go 585: Cleaning up netns ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.322 [INFO][5400] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" iface="eth0" netns="" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.322 [INFO][5400] k8s.go 592: Releasing IP address(es) ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.322 [INFO][5400] utils.go 188: Calico CNI releasing IP address ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.349 [INFO][5419] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.350 [INFO][5419] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.350 [INFO][5419] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.357 [WARNING][5419] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.357 [INFO][5419] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.359 [INFO][5419] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.362659 env[1474]: 2024-04-12 21:47:12.360 [INFO][5400] k8s.go 598: Teardown processing complete. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.363302 env[1474]: time="2024-04-12T21:47:12.362681453Z" level=info msg="TearDown network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" successfully" Apr 12 21:47:12.363302 env[1474]: time="2024-04-12T21:47:12.362719711Z" level=info msg="StopPodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" returns successfully" Apr 12 21:47:12.363302 env[1474]: time="2024-04-12T21:47:12.363186053Z" level=info msg="RemovePodSandbox for \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\"" Apr 12 21:47:12.363302 env[1474]: time="2024-04-12T21:47:12.363223763Z" level=info msg="Forcibly stopping sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\"" Apr 12 21:47:12.406142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount342714346.mount: Deactivated successfully. Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.392 [WARNING][5451] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0", GenerateName:"calico-kube-controllers-565bdc4d65-", Namespace:"calico-system", SelfLink:"", UID:"69ba74ab-daf7-4f87-b177-c93b5873a24f", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"565bdc4d65", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"d4049d318599bed054520aadf98270b7ae09f830b6e2499f62b0a7d8bc41e824", Pod:"calico-kube-controllers-565bdc4d65-2t2c8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali51db75d729d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.393 [INFO][5451] k8s.go 585: Cleaning up netns ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.393 [INFO][5451] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" iface="eth0" netns="" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.393 [INFO][5451] k8s.go 592: Releasing IP address(es) ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.393 [INFO][5451] utils.go 188: Calico CNI releasing IP address ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.404 [INFO][5465] ipam_plugin.go 415: Releasing address using handleID ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.404 [INFO][5465] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.404 [INFO][5465] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.408 [WARNING][5465] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.408 [INFO][5465] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" HandleID="k8s-pod-network.8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Workload="ci--3510.3.3--a--26e8ad9098-k8s-calico--kube--controllers--565bdc4d65--2t2c8-eth0" Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.409 [INFO][5465] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.410782 env[1474]: 2024-04-12 21:47:12.410 [INFO][5451] k8s.go 598: Teardown processing complete. ContainerID="8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722" Apr 12 21:47:12.411085 env[1474]: time="2024-04-12T21:47:12.410785362Z" level=info msg="TearDown network for sandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" successfully" Apr 12 21:47:12.415282 systemd-networkd[1320]: cali3aad5a82b8f: Gained IPv6LL Apr 12 21:47:12.428101 env[1474]: time="2024-04-12T21:47:12.428088216Z" level=info msg="RemovePodSandbox \"8a0221b80ef55776b14f0f1595e4e6442fe5c56e098d22b17752089b36b05722\" returns successfully" Apr 12 21:47:12.428371 env[1474]: time="2024-04-12T21:47:12.428354710Z" level=info msg="StopPodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\"" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.446 [WARNING][5496] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"589877c5-c6c3-4951-9e7e-7b8f65a7589c", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41", Pod:"csi-node-driver-bnhfc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.43.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali587409aefdf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.446 [INFO][5496] k8s.go 585: Cleaning up netns ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.446 [INFO][5496] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" iface="eth0" netns="" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.446 [INFO][5496] k8s.go 592: Releasing IP address(es) ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.446 [INFO][5496] utils.go 188: Calico CNI releasing IP address ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.456 [INFO][5513] ipam_plugin.go 415: Releasing address using handleID ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.456 [INFO][5513] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.457 [INFO][5513] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.461 [WARNING][5513] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.461 [INFO][5513] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.462 [INFO][5513] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.463478 env[1474]: 2024-04-12 21:47:12.462 [INFO][5496] k8s.go 598: Teardown processing complete. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.463478 env[1474]: time="2024-04-12T21:47:12.463460518Z" level=info msg="TearDown network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" successfully" Apr 12 21:47:12.463478 env[1474]: time="2024-04-12T21:47:12.463478872Z" level=info msg="StopPodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" returns successfully" Apr 12 21:47:12.463867 env[1474]: time="2024-04-12T21:47:12.463724019Z" level=info msg="RemovePodSandbox for \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\"" Apr 12 21:47:12.463867 env[1474]: time="2024-04-12T21:47:12.463740861Z" level=info msg="Forcibly stopping sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\"" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.482 [WARNING][5542] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"589877c5-c6c3-4951-9e7e-7b8f65a7589c", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 46, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-26e8ad9098", ContainerID:"40e6a3cce1dddb5bc9c2744ff94219028d74c28af3d7f60728d2bea6fec0bf41", Pod:"csi-node-driver-bnhfc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.43.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali587409aefdf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.482 [INFO][5542] k8s.go 585: Cleaning up netns ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.482 [INFO][5542] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" iface="eth0" netns="" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.482 [INFO][5542] k8s.go 592: Releasing IP address(es) ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.482 [INFO][5542] utils.go 188: Calico CNI releasing IP address ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.492 [INFO][5558] ipam_plugin.go 415: Releasing address using handleID ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.492 [INFO][5558] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.492 [INFO][5558] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.496 [WARNING][5558] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.496 [INFO][5558] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" HandleID="k8s-pod-network.2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Workload="ci--3510.3.3--a--26e8ad9098-k8s-csi--node--driver--bnhfc-eth0" Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.497 [INFO][5558] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:47:12.499128 env[1474]: 2024-04-12 21:47:12.498 [INFO][5542] k8s.go 598: Teardown processing complete. ContainerID="2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1" Apr 12 21:47:12.499498 env[1474]: time="2024-04-12T21:47:12.499146370Z" level=info msg="TearDown network for sandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" successfully" Apr 12 21:47:12.500589 env[1474]: time="2024-04-12T21:47:12.500548134Z" level=info msg="RemovePodSandbox \"2f83325279ffc84286a40387ca818097c87ef5bc7e5affc444e077b221af32c1\" returns successfully" Apr 12 21:47:13.764571 env[1474]: time="2024-04-12T21:47:13.764543984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:13.765203 env[1474]: time="2024-04-12T21:47:13.765186798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:13.765892 env[1474]: time="2024-04-12T21:47:13.765879592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:13.766828 env[1474]: time="2024-04-12T21:47:13.766813172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:13.767000 env[1474]: time="2024-04-12T21:47:13.766985097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 21:47:13.767377 env[1474]: time="2024-04-12T21:47:13.767357756Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 21:47:13.768222 env[1474]: time="2024-04-12T21:47:13.768205542Z" level=info msg="CreateContainer within sandbox \"d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 21:47:13.772475 env[1474]: time="2024-04-12T21:47:13.772459023Z" level=info msg="CreateContainer within sandbox \"d41b2eb556b0980b40ab736638fd9fe4c8316ea26648568e641f971b6b009c5e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ee707d75aec2b6e83e96af9ffa9e76e4be6c94cb5e8fceebafa567d543987724\"" Apr 12 21:47:13.772852 env[1474]: time="2024-04-12T21:47:13.772806126Z" level=info msg="StartContainer for \"ee707d75aec2b6e83e96af9ffa9e76e4be6c94cb5e8fceebafa567d543987724\"" Apr 12 21:47:13.782600 systemd[1]: Started cri-containerd-ee707d75aec2b6e83e96af9ffa9e76e4be6c94cb5e8fceebafa567d543987724.scope. Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.815868 kernel: kauditd_printk_skb: 152 callbacks suppressed Apr 12 21:47:13.815916 kernel: audit: type=1400 audit(1712958433.788:1384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.940511 kernel: audit: type=1400 audit(1712958433.788:1385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.940551 kernel: audit: type=1400 audit(1712958433.788:1386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002410 kernel: audit: type=1400 audit(1712958433.788:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.064567 kernel: audit: type=1400 audit(1712958433.788:1388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.093594 env[1474]: time="2024-04-12T21:47:14.093546863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:14.094295 env[1474]: time="2024-04-12T21:47:14.094249260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:14.094889 env[1474]: time="2024-04-12T21:47:14.094877128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:14.095512 env[1474]: time="2024-04-12T21:47:14.095498560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:47:14.095646 env[1474]: time="2024-04-12T21:47:14.095633144Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 21:47:14.096829 env[1474]: time="2024-04-12T21:47:14.096781631Z" level=info msg="CreateContainer within sandbox \"6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 21:47:14.126706 kernel: audit: type=1400 audit(1712958433.788:1389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.188857 kernel: audit: type=1400 audit(1712958433.788:1390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.190400 env[1474]: time="2024-04-12T21:47:14.190350002Z" level=info msg="CreateContainer within sandbox \"6183176344989795116002dfa7c9ba6540061d20cb093fe156463dba734c3939\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"98cbeeb52085aac1a7cf20c62dfaf2cbdc4f9e2ca4fbca85200a77ed2ba1ec3f\"" Apr 12 21:47:14.190624 env[1474]: time="2024-04-12T21:47:14.190584893Z" level=info msg="StartContainer for \"98cbeeb52085aac1a7cf20c62dfaf2cbdc4f9e2ca4fbca85200a77ed2ba1ec3f\"" Apr 12 21:47:14.198775 systemd[1]: Started cri-containerd-98cbeeb52085aac1a7cf20c62dfaf2cbdc4f9e2ca4fbca85200a77ed2ba1ec3f.scope. Apr 12 21:47:14.251234 kernel: audit: type=1400 audit(1712958433.788:1391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.313707 kernel: audit: type=1400 audit(1712958433.788:1392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.438017 kernel: audit: type=1400 audit(1712958433.878:1393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit: BPF prog-id=194 op=LOAD Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=5115 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:13.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565373037643735616563326236653833653936616639666661396537 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=5115 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:13.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565373037643735616563326236653833653936616639666661396537 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:13.878000 audit: BPF prog-id=195 op=LOAD Apr 12 21:47:13.878000 audit[5587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00024ddf0 items=0 ppid=5115 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:13.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565373037643735616563326236653833653936616639666661396537 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.002000 audit: BPF prog-id=196 op=LOAD Apr 12 21:47:14.002000 audit[5587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00024de38 items=0 ppid=5115 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565373037643735616563326236653833653936616639666661396537 Apr 12 21:47:14.125000 audit: BPF prog-id=196 op=UNLOAD Apr 12 21:47:14.125000 audit: BPF prog-id=195 op=UNLOAD Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { perfmon } for pid=5587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit[5587]: AVC avc: denied { bpf } for pid=5587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.125000 audit: BPF prog-id=197 op=LOAD Apr 12 21:47:14.125000 audit[5587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003aa248 items=0 ppid=5115 pid=5587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565373037643735616563326236653833653936616639666661396537 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.374000 audit: BPF prog-id=198 op=LOAD Apr 12 21:47:14.375000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.375000 audit[5631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5171 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636265656235323038356161633161376366323063363264666166 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5171 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636265656235323038356161633161376366323063363264666166 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit: BPF prog-id=199 op=LOAD Apr 12 21:47:14.436000 audit[5631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000303ad0 items=0 ppid=5171 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636265656235323038356161633161376366323063363264666166 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.436000 audit: BPF prog-id=200 op=LOAD Apr 12 21:47:14.436000 audit[5631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000303b18 items=0 ppid=5171 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636265656235323038356161633161376366323063363264666166 Apr 12 21:47:14.437000 audit: BPF prog-id=200 op=UNLOAD Apr 12 21:47:14.437000 audit: BPF prog-id=199 op=UNLOAD Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { perfmon } for pid=5631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit[5631]: AVC avc: denied { bpf } for pid=5631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:47:14.437000 audit: BPF prog-id=201 op=LOAD Apr 12 21:47:14.437000 audit[5631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000303f28 items=0 ppid=5171 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:14.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938636265656235323038356161633161376366323063363264666166 Apr 12 21:47:14.454829 env[1474]: time="2024-04-12T21:47:14.454803358Z" level=info msg="StartContainer for \"ee707d75aec2b6e83e96af9ffa9e76e4be6c94cb5e8fceebafa567d543987724\" returns successfully" Apr 12 21:47:14.454961 env[1474]: time="2024-04-12T21:47:14.454950759Z" level=info msg="StartContainer for \"98cbeeb52085aac1a7cf20c62dfaf2cbdc4f9e2ca4fbca85200a77ed2ba1ec3f\" returns successfully" Apr 12 21:47:14.816000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:47:14.816000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d8e2c0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:47:14.816000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:47:14.967000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:47:14.967000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db2640 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:47:14.967000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:47:15.343742 kubelet[2565]: I0412 21:47:15.343677 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d44db4b69-hqgcc" podStartSLOduration=3.537796869 podCreationTimestamp="2024-04-12 21:47:09 +0000 UTC" firstStartedPulling="2024-04-12 21:47:10.961416836 +0000 UTC m=+58.908724018" lastFinishedPulling="2024-04-12 21:47:13.767204766 +0000 UTC m=+61.714511960" observedRunningTime="2024-04-12 21:47:15.342265044 +0000 UTC m=+63.289572314" watchObservedRunningTime="2024-04-12 21:47:15.343584811 +0000 UTC m=+63.290892044" Apr 12 21:47:15.363000 audit[5706]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:15.363000 audit[5706]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc1d309630 a2=0 a3=7ffc1d30961c items=0 ppid=2819 pid=5706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:15.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:15.365000 audit[5706]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:15.365000 audit[5706]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc1d309630 a2=0 a3=7ffc1d30961c items=0 ppid=2819 pid=5706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:15.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:15.387000 audit[5708]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=5708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:15.387000 audit[5708]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8e633ed0 a2=0 a3=7ffd8e633ebc items=0 ppid=2819 pid=5708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:15.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:15.390000 audit[5708]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=5708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:15.390000 audit[5708]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd8e633ed0 a2=0 a3=7ffd8e633ebc items=0 ppid=2819 pid=5708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:15.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:40.823424 kubelet[2565]: I0412 21:47:40.823403 2565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d44db4b69-n5rv9" podStartSLOduration=28.727921953 podCreationTimestamp="2024-04-12 21:47:09 +0000 UTC" firstStartedPulling="2024-04-12 21:47:11.000341815 +0000 UTC m=+58.947649009" lastFinishedPulling="2024-04-12 21:47:14.095788365 +0000 UTC m=+62.043095549" observedRunningTime="2024-04-12 21:47:15.360811346 +0000 UTC m=+63.308118658" watchObservedRunningTime="2024-04-12 21:47:40.823368493 +0000 UTC m=+88.770675677" Apr 12 21:47:40.829000 audit[5804]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:40.856479 kernel: kauditd_printk_skb: 122 callbacks suppressed Apr 12 21:47:40.856558 kernel: audit: type=1325 audit(1712958460.829:1426): table=filter:123 family=2 entries=9 op=nft_register_rule pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:40.829000 audit[5804]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcedf0a6c0 a2=0 a3=7ffcedf0a6ac items=0 ppid=2819 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:40.914233 kernel: audit: type=1300 audit(1712958460.829:1426): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcedf0a6c0 a2=0 a3=7ffcedf0a6ac items=0 ppid=2819 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:40.829000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.065956 kernel: audit: type=1327 audit(1712958460.829:1426): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.067000 audit[5804]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:41.067000 audit[5804]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcedf0a6c0 a2=0 a3=7ffcedf0a6ac items=0 ppid=2819 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:41.221831 kernel: audit: type=1325 audit(1712958461.067:1427): table=nat:124 family=2 entries=27 op=nft_register_chain pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:41.221866 kernel: audit: type=1300 audit(1712958461.067:1427): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcedf0a6c0 a2=0 a3=7ffcedf0a6ac items=0 ppid=2819 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:41.221885 kernel: audit: type=1327 audit(1712958461.067:1427): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.071000 audit[5807]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:41.071000 audit[5807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff16d3ea00 a2=0 a3=7fff16d3e9ec items=0 ppid=2819 pid=5807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:41.436453 kernel: audit: type=1325 audit(1712958461.071:1428): table=filter:125 family=2 entries=8 op=nft_register_rule pid=5807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:41.436515 kernel: audit: type=1300 audit(1712958461.071:1428): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff16d3ea00 a2=0 a3=7fff16d3e9ec items=0 ppid=2819 pid=5807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:41.436534 kernel: audit: type=1327 audit(1712958461.071:1428): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.282000 audit[5807]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=5807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:47:41.282000 audit[5807]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff16d3ea00 a2=0 a3=7fff16d3e9ec items=0 ppid=2819 pid=5807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:47:41.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:47:41.555322 kernel: audit: type=1325 audit(1712958461.282:1429): table=nat:126 family=2 entries=34 op=nft_register_chain pid=5807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:48:08.026000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.054587 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:48:08.054671 kernel: audit: type=1400 audit(1712958488.026:1430): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.026000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.238677 kernel: audit: type=1400 audit(1712958488.026:1431): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.238713 kernel: audit: type=1300 audit(1712958488.026:1431): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2d020 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:08.026000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2d020 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:08.026000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00147e180 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:08.360295 kernel: audit: type=1300 audit(1712958488.026:1430): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00147e180 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:08.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:08.574192 kernel: audit: type=1327 audit(1712958488.026:1430): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:08.574236 kernel: audit: type=1327 audit(1712958488.026:1431): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:08.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:08.667542 kernel: audit: type=1400 audit(1712958488.095:1432): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c01521d050 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.857551 kernel: audit: type=1300 audit(1712958488.095:1432): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c01521d050 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.857587 kernel: audit: type=1327 audit(1712958488.095:1432): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:08.951296 kernel: audit: type=1400 audit(1712958488.095:1433): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0145451a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c014aa3700 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0145451d0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014aa3720 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014545230 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:48:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:48:10.911000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:10.911000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010efb80 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:10.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:10.911000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:10.911000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001182500 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:10.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:10.911000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:10.911000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00110f6a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:10.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:10.912000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:48:10.912000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcff60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:48:10.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:48:14.816000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:48:14.844988 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:48:14.845068 kernel: audit: type=1400 audit(1712958494.816:1442): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:48:14.816000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c92c80 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:48:14.941255 kernel: audit: type=1300 audit(1712958494.816:1442): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c92c80 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:48:14.816000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:48:15.132172 kernel: audit: type=1327 audit(1712958494.816:1442): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:48:15.132206 kernel: audit: type=1400 audit(1712958494.968:1443): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:48:14.968000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:48:15.227964 kernel: audit: type=1300 audit(1712958494.968:1443): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019516e0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:48:14.968000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019516e0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:48:15.324932 kernel: audit: type=1327 audit(1712958494.968:1443): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:48:14.968000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:49:08.027000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.027000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d8f890 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:08.243161 kernel: audit: type=1400 audit(1712958548.027:1444): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.243255 kernel: audit: type=1300 audit(1712958548.027:1444): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d8f890 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:08.243295 kernel: audit: type=1327 audit(1712958548.027:1444): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:08.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:08.027000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.426104 kernel: audit: type=1400 audit(1712958548.027:1445): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.426153 kernel: audit: type=1300 audit(1712958548.027:1445): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019a55c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:08.027000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019a55c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:08.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:08.639586 kernel: audit: type=1327 audit(1712958548.027:1445): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:08.639640 kernel: audit: type=1400 audit(1712958548.095:1446): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c006dbd110 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.829365 kernel: audit: type=1300 audit(1712958548.095:1446): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c006dbd110 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.829428 kernel: audit: type=1327 audit(1712958548.095:1446): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:09.014745 kernel: audit: type=1400 audit(1712958548.095:1447): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00603bcb0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.095000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c011b64cf0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.095000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006dbd140 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:08.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006d02980 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008a62f40 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:49:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:49:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa8040 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00181b820 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001627e20 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:49:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00171d8c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:49:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:49:14.817000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:49:14.845829 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:49:14.845891 kernel: audit: type=1400 audit(1712958554.817:1456): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:49:14.817000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d8f1e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:49:15.037708 kernel: audit: type=1300 audit(1712958554.817:1456): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d8f1e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:49:15.037792 kernel: audit: type=1327 audit(1712958554.817:1456): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:49:14.817000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:49:15.132306 kernel: audit: type=1400 audit(1712958554.968:1457): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:49:14.968000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:49:15.227425 kernel: audit: type=1300 audit(1712958554.968:1457): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db2000 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:49:14.968000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db2000 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:49:15.324437 kernel: audit: type=1327 audit(1712958554.968:1457): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:49:14.968000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:08.028000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.028000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011824c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:08.246076 kernel: audit: type=1400 audit(1712958608.028:1458): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.246134 kernel: audit: type=1300 audit(1712958608.028:1458): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011824c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:08.246159 kernel: audit: type=1327 audit(1712958608.028:1458): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:08.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:08.339315 kernel: audit: type=1400 audit(1712958608.028:1459): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.028000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.430418 kernel: audit: type=1300 audit(1712958608.028:1459): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d8e6f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:08.028000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d8e6f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:08.550692 kernel: audit: type=1327 audit(1712958608.028:1459): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:08.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:08.643877 kernel: audit: type=1400 audit(1712958608.096:1460): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.733874 kernel: audit: type=1300 audit(1712958608.096:1460): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0145273e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0145273e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.832182 kernel: audit: type=1327 audit(1712958608.096:1460): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:08.925530 kernel: audit: type=1400 audit(1712958608.096:1461): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c011bafce0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015016c80 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01449a270 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0150e05a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:08.096000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:08.096000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0125f9770 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:50:08.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:50:09.695033 systemd[1]: Started sshd@8-145.40.90.149:22-183.81.169.238:54810.service. Apr 12 21:50:09.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.90.149:22-183.81.169.238:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:10.446177 sshd[6391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:10.445000 audit[6391]: USER_AUTH pid=6391 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:10.912000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b89540 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:10.912000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001182500 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:10.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001ba5b60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:10.914000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:50:10.914000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ba5b80 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:50:10.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:50:12.227504 sshd[6391]: Failed password for root from 183.81.169.238 port 54810 ssh2 Apr 12 21:50:12.773677 sshd[6391]: Connection closed by authenticating user root 183.81.169.238 port 54810 [preauth] Apr 12 21:50:12.776183 systemd[1]: sshd@8-145.40.90.149:22-183.81.169.238:54810.service: Deactivated successfully. Apr 12 21:50:12.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.90.149:22-183.81.169.238:54810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:12.927141 systemd[1]: Started sshd@9-145.40.90.149:22-183.81.169.238:54812.service. Apr 12 21:50:12.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.90.149:22-183.81.169.238:54812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:13.670300 sshd[6440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:13.669000 audit[6440]: USER_AUTH pid=6440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:13.712910 kernel: kauditd_printk_skb: 30 callbacks suppressed Apr 12 21:50:13.712996 kernel: audit: type=1100 audit(1712958613.669:1474): pid=6440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:14.817000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:50:14.817000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00199e080 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:50:15.013657 kernel: audit: type=1400 audit(1712958614.817:1475): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:50:15.013696 kernel: audit: type=1300 audit(1712958614.817:1475): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00199e080 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:50:15.013713 kernel: audit: type=1327 audit(1712958614.817:1475): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:14.817000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:15.107272 kernel: audit: type=1400 audit(1712958614.968:1476): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:50:14.968000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:50:15.202827 kernel: audit: type=1300 audit(1712958614.968:1476): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004f2160 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:50:14.968000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004f2160 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:50:15.300085 kernel: audit: type=1327 audit(1712958614.968:1476): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:14.968000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:50:16.200117 sshd[6440]: Failed password for root from 183.81.169.238 port 54812 ssh2 Apr 12 21:50:17.830163 sshd[6440]: Connection closed by authenticating user root 183.81.169.238 port 54812 [preauth] Apr 12 21:50:17.832936 systemd[1]: sshd@9-145.40.90.149:22-183.81.169.238:54812.service: Deactivated successfully. Apr 12 21:50:17.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.90.149:22-183.81.169.238:54812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:17.925368 kernel: audit: type=1131 audit(1712958617.833:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.90.149:22-183.81.169.238:54812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:17.974736 systemd[1]: Started sshd@10-145.40.90.149:22-183.81.169.238:53180.service. Apr 12 21:50:17.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.90.149:22-183.81.169.238:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:18.064235 kernel: audit: type=1130 audit(1712958617.974:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.90.149:22-183.81.169.238:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:19.054369 sshd[6464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:19.054000 audit[6464]: USER_AUTH pid=6464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:19.147302 kernel: audit: type=1100 audit(1712958619.054:1479): pid=6464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:21.071285 sshd[6464]: Failed password for root from 183.81.169.238 port 53180 ssh2 Apr 12 21:50:23.214141 sshd[6464]: Connection closed by authenticating user root 183.81.169.238 port 53180 [preauth] Apr 12 21:50:23.216671 systemd[1]: sshd@10-145.40.90.149:22-183.81.169.238:53180.service: Deactivated successfully. Apr 12 21:50:23.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.90.149:22-183.81.169.238:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:23.309363 kernel: audit: type=1131 audit(1712958623.215:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.90.149:22-183.81.169.238:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:23.368747 systemd[1]: Started sshd@11-145.40.90.149:22-183.81.169.238:53204.service. Apr 12 21:50:23.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.90.149:22-183.81.169.238:53204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:23.461458 kernel: audit: type=1130 audit(1712958623.367:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.90.149:22-183.81.169.238:53204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:24.126671 sshd[6468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:24.125000 audit[6468]: USER_AUTH pid=6468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:24.218458 kernel: audit: type=1100 audit(1712958624.125:1482): pid=6468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:26.164934 sshd[6468]: Failed password for root from 183.81.169.238 port 53204 ssh2 Apr 12 21:50:28.415515 sshd[6468]: Connection closed by authenticating user root 183.81.169.238 port 53204 [preauth] Apr 12 21:50:28.416193 systemd[1]: sshd@11-145.40.90.149:22-183.81.169.238:53204.service: Deactivated successfully. Apr 12 21:50:28.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.90.149:22-183.81.169.238:53204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:28.508296 kernel: audit: type=1131 audit(1712958628.415:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.90.149:22-183.81.169.238:53204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:28.569781 systemd[1]: Started sshd@12-145.40.90.149:22-183.81.169.238:55694.service. Apr 12 21:50:28.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.149:22-183.81.169.238:55694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:28.662461 kernel: audit: type=1130 audit(1712958628.568:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.149:22-183.81.169.238:55694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:29.308152 sshd[6479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:29.307000 audit[6479]: ANOM_LOGIN_FAILURES pid=6479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:29.308427 sshd[6479]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 21:50:29.307000 audit[6479]: USER_AUTH pid=6479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:29.465868 kernel: audit: type=2100 audit(1712958629.307:1485): pid=6479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:29.465905 kernel: audit: type=1100 audit(1712958629.307:1486): pid=6479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:31.366570 sshd[6479]: Failed password for root from 183.81.169.238 port 55694 ssh2 Apr 12 21:50:33.468095 sshd[6479]: Connection closed by authenticating user root 183.81.169.238 port 55694 [preauth] Apr 12 21:50:33.470750 systemd[1]: sshd@12-145.40.90.149:22-183.81.169.238:55694.service: Deactivated successfully. Apr 12 21:50:33.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.149:22-183.81.169.238:55694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:33.564452 kernel: audit: type=1131 audit(1712958633.471:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.90.149:22-183.81.169.238:55694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:33.611339 systemd[1]: Started sshd@13-145.40.90.149:22-183.81.169.238:55752.service. Apr 12 21:50:33.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.149:22-183.81.169.238:55752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:33.702288 kernel: audit: type=1130 audit(1712958633.611:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.149:22-183.81.169.238:55752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:34.634119 sshd[6516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:34.633000 audit[6516]: USER_AUTH pid=6516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:34.729340 kernel: audit: type=1100 audit(1712958634.633:1489): pid=6516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:36.376641 sshd[6516]: Failed password for root from 183.81.169.238 port 55752 ssh2 Apr 12 21:50:36.784679 sshd[6516]: Connection closed by authenticating user root 183.81.169.238 port 55752 [preauth] Apr 12 21:50:36.787057 systemd[1]: sshd@13-145.40.90.149:22-183.81.169.238:55752.service: Deactivated successfully. Apr 12 21:50:36.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.149:22-183.81.169.238:55752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:36.880295 kernel: audit: type=1131 audit(1712958636.786:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.149:22-183.81.169.238:55752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:36.936289 systemd[1]: Started sshd@14-145.40.90.149:22-183.81.169.238:56278.service. Apr 12 21:50:36.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.149:22-183.81.169.238:56278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:37.029235 kernel: audit: type=1130 audit(1712958636.935:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.149:22-183.81.169.238:56278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:37.907964 sshd[6520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:37.907000 audit[6520]: USER_AUTH pid=6520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:38.000355 kernel: audit: type=1100 audit(1712958637.907:1492): pid=6520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:40.397486 sshd[6520]: Failed password for root from 183.81.169.238 port 56278 ssh2 Apr 12 21:50:42.103576 sshd[6520]: Connection closed by authenticating user root 183.81.169.238 port 56278 [preauth] Apr 12 21:50:42.106214 systemd[1]: sshd@14-145.40.90.149:22-183.81.169.238:56278.service: Deactivated successfully. Apr 12 21:50:42.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.149:22-183.81.169.238:56278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:42.199456 kernel: audit: type=1131 audit(1712958642.106:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.149:22-183.81.169.238:56278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:42.253721 systemd[1]: Started sshd@15-145.40.90.149:22-183.81.169.238:56316.service. Apr 12 21:50:42.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.149:22-183.81.169.238:56316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:42.345438 kernel: audit: type=1130 audit(1712958642.253:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.149:22-183.81.169.238:56316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:43.007613 sshd[6563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:43.007000 audit[6563]: USER_AUTH pid=6563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:43.101450 kernel: audit: type=1100 audit(1712958643.007:1495): pid=6563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:44.986044 sshd[6563]: Failed password for root from 183.81.169.238 port 56316 ssh2 Apr 12 21:50:45.161411 sshd[6563]: Connection closed by authenticating user root 183.81.169.238 port 56316 [preauth] Apr 12 21:50:45.164088 systemd[1]: sshd@15-145.40.90.149:22-183.81.169.238:56316.service: Deactivated successfully. Apr 12 21:50:45.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.149:22-183.81.169.238:56316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:45.258451 kernel: audit: type=1131 audit(1712958645.163:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.149:22-183.81.169.238:56316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:45.307201 systemd[1]: Started sshd@16-145.40.90.149:22-183.81.169.238:37482.service. Apr 12 21:50:45.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.149:22-183.81.169.238:37482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:45.400234 kernel: audit: type=1130 audit(1712958645.306:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.149:22-183.81.169.238:37482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:46.168093 sshd[6593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:46.167000 audit[6593]: USER_AUTH pid=6593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:46.267316 kernel: audit: type=1100 audit(1712958646.167:1498): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:47.559193 sshd[6593]: Failed password for root from 183.81.169.238 port 37482 ssh2 Apr 12 21:50:48.321532 sshd[6593]: Connection closed by authenticating user root 183.81.169.238 port 37482 [preauth] Apr 12 21:50:48.324079 systemd[1]: sshd@16-145.40.90.149:22-183.81.169.238:37482.service: Deactivated successfully. Apr 12 21:50:48.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.149:22-183.81.169.238:37482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:48.418315 kernel: audit: type=1131 audit(1712958648.323:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.149:22-183.81.169.238:37482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:48.472588 systemd[1]: Started sshd@17-145.40.90.149:22-183.81.169.238:37504.service. Apr 12 21:50:48.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.149:22-183.81.169.238:37504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:48.564317 kernel: audit: type=1130 audit(1712958648.471:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.149:22-183.81.169.238:37504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:49.495100 sshd[6599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:49.494000 audit[6599]: USER_AUTH pid=6599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:49.587452 kernel: audit: type=1100 audit(1712958649.494:1501): pid=6599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:51.965061 sshd[6599]: Failed password for root from 183.81.169.238 port 37504 ssh2 Apr 12 21:50:53.672535 sshd[6599]: Connection closed by authenticating user root 183.81.169.238 port 37504 [preauth] Apr 12 21:50:53.675085 systemd[1]: sshd@17-145.40.90.149:22-183.81.169.238:37504.service: Deactivated successfully. Apr 12 21:50:53.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.149:22-183.81.169.238:37504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:53.769319 kernel: audit: type=1131 audit(1712958653.675:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.149:22-183.81.169.238:37504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:53.841788 systemd[1]: Started sshd@18-145.40.90.149:22-183.81.169.238:37514.service. Apr 12 21:50:53.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.149:22-183.81.169.238:37514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:53.935461 kernel: audit: type=1130 audit(1712958653.841:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.149:22-183.81.169.238:37514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:54.594761 sshd[6608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:54.593000 audit[6608]: USER_AUTH pid=6608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:54.688307 kernel: audit: type=1100 audit(1712958654.593:1504): pid=6608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:56.416443 sshd[6608]: Failed password for root from 183.81.169.238 port 37514 ssh2 Apr 12 21:50:56.756406 sshd[6608]: Connection closed by authenticating user root 183.81.169.238 port 37514 [preauth] Apr 12 21:50:56.759004 systemd[1]: sshd@18-145.40.90.149:22-183.81.169.238:37514.service: Deactivated successfully. Apr 12 21:50:56.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.149:22-183.81.169.238:37514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.852271 kernel: audit: type=1131 audit(1712958656.758:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.149:22-183.81.169.238:37514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.898326 systemd[1]: Started sshd@19-145.40.90.149:22-183.81.169.238:46102.service. Apr 12 21:50:56.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.149:22-183.81.169.238:46102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:56.990465 kernel: audit: type=1130 audit(1712958656.897:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.149:22-183.81.169.238:46102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:50:57.791303 sshd[6639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:50:57.790000 audit[6639]: USER_AUTH pid=6639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:57.883305 kernel: audit: type=1100 audit(1712958657.790:1507): pid=6639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:50:59.693625 sshd[6639]: Failed password for root from 183.81.169.238 port 46102 ssh2 Apr 12 21:50:59.941221 sshd[6639]: Connection closed by authenticating user root 183.81.169.238 port 46102 [preauth] Apr 12 21:50:59.943664 systemd[1]: sshd@19-145.40.90.149:22-183.81.169.238:46102.service: Deactivated successfully. Apr 12 21:50:59.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.149:22-183.81.169.238:46102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:00.038464 kernel: audit: type=1131 audit(1712958659.943:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.149:22-183.81.169.238:46102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:00.088920 systemd[1]: Started sshd@20-145.40.90.149:22-183.81.169.238:46104.service. Apr 12 21:51:00.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.149:22-183.81.169.238:46104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:00.180303 kernel: audit: type=1130 audit(1712958660.087:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.149:22-183.81.169.238:46104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:01.109994 sshd[6643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:01.109000 audit[6643]: USER_AUTH pid=6643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:01.204308 kernel: audit: type=1100 audit(1712958661.109:1510): pid=6643 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:03.228507 sshd[6643]: Failed password for root from 183.81.169.238 port 46104 ssh2 Apr 12 21:51:05.273765 sshd[6643]: Connection closed by authenticating user root 183.81.169.238 port 46104 [preauth] Apr 12 21:51:05.276417 systemd[1]: sshd@20-145.40.90.149:22-183.81.169.238:46104.service: Deactivated successfully. Apr 12 21:51:05.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.149:22-183.81.169.238:46104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:05.370290 kernel: audit: type=1131 audit(1712958665.276:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.149:22-183.81.169.238:46104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:05.415022 systemd[1]: Started sshd@21-145.40.90.149:22-183.81.169.238:37344.service. Apr 12 21:51:05.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.149:22-183.81.169.238:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:05.507281 kernel: audit: type=1130 audit(1712958665.413:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.149:22-183.81.169.238:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:06.146833 sshd[6678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:06.146000 audit[6678]: USER_AUTH pid=6678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:06.238269 kernel: audit: type=1100 audit(1712958666.146:1513): pid=6678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:07.949466 sshd[6678]: Failed password for root from 183.81.169.238 port 37344 ssh2 Apr 12 21:51:08.030000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.030000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00110fb00 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:08.247192 kernel: audit: type=1400 audit(1712958668.030:1514): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.247266 kernel: audit: type=1300 audit(1712958668.030:1514): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00110fb00 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:08.247285 kernel: audit: type=1327 audit(1712958668.030:1514): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:08.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:08.318751 sshd[6678]: Connection closed by authenticating user root 183.81.169.238 port 37344 [preauth] Apr 12 21:51:08.319351 systemd[1]: sshd@21-145.40.90.149:22-183.81.169.238:37344.service: Deactivated successfully. Apr 12 21:51:08.341891 kernel: audit: type=1400 audit(1712958668.030:1515): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.030000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.434533 kernel: audit: type=1300 audit(1712958668.030:1515): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012ca6f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:08.030000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012ca6f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:08.485054 systemd[1]: Started sshd@22-145.40.90.149:22-183.81.169.238:37350.service. Apr 12 21:51:08.556647 kernel: audit: type=1327 audit(1712958668.030:1515): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:08.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.743556 kernel: audit: type=1400 audit(1712958668.098:1516): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01018c210 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:51:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:51:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01359cea0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:51:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:51:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007ea56b0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:51:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c006b4b100 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:51:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:51:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:51:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c01018c2a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:51:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:51:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c007bbea80 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:51:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:51:08.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.149:22-183.81.169.238:37344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:08.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.149:22-183.81.169.238:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:09.405539 sshd[6682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:09.404000 audit[6682]: USER_AUTH pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:10.941865 kernel: kauditd_printk_skb: 20 callbacks suppressed Apr 12 21:51:10.941905 kernel: audit: type=1400 audit(1712958670.913:1526): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:11.126198 kernel: audit: type=1400 audit(1712958670.913:1525): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:11.126263 kernel: audit: type=1300 audit(1712958670.913:1526): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00110fc60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00110fc60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:11.246943 kernel: audit: type=1327 audit(1712958670.913:1526): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:11.287845 sshd[6682]: Failed password for root from 183.81.169.238 port 37350 ssh2 Apr 12 21:51:11.342152 kernel: audit: type=1300 audit(1712958670.913:1525): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa9d60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa9d60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:11.465635 kernel: audit: type=1327 audit(1712958670.913:1525): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:10.913000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:11.561861 sshd[6682]: Connection closed by authenticating user root 183.81.169.238 port 37350 [preauth] Apr 12 21:51:11.562552 systemd[1]: sshd@22-145.40.90.149:22-183.81.169.238:37350.service: Deactivated successfully. Apr 12 21:51:11.648999 kernel: audit: type=1400 audit(1712958670.913:1527): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:11.649033 kernel: audit: type=1300 audit(1712958670.913:1527): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015a27a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:10.913000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015a27a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:11.708589 systemd[1]: Started sshd@23-145.40.90.149:22-183.81.169.238:37354.service. Apr 12 21:51:10.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:11.862361 kernel: audit: type=1327 audit(1712958670.913:1527): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:11.862402 kernel: audit: type=1400 audit(1712958670.914:1528): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:10.914000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:51:10.914000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001046000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:51:10.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:51:11.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.149:22-183.81.169.238:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:11.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.149:22-183.81.169.238:37354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:12.738222 sshd[6725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:12.737000 audit[6725]: USER_AUTH pid=6725 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:14.818000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:51:14.818000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f882c0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:51:14.818000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:51:14.970000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:51:14.970000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019500a0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:51:14.970000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:51:15.032467 sshd[6725]: Failed password for root from 183.81.169.238 port 37354 ssh2 Apr 12 21:51:16.902022 sshd[6725]: Connection closed by authenticating user root 183.81.169.238 port 37354 [preauth] Apr 12 21:51:16.904724 systemd[1]: sshd@23-145.40.90.149:22-183.81.169.238:37354.service: Deactivated successfully. Apr 12 21:51:16.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.149:22-183.81.169.238:37354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:16.932368 kernel: kauditd_printk_skb: 11 callbacks suppressed Apr 12 21:51:16.932444 kernel: audit: type=1131 audit(1712958676.904:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.149:22-183.81.169.238:37354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:17.047269 systemd[1]: Started sshd@24-145.40.90.149:22-183.81.169.238:33796.service. Apr 12 21:51:17.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.149:22-183.81.169.238:33796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:17.137320 kernel: audit: type=1130 audit(1712958677.046:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.149:22-183.81.169.238:33796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:17.799463 sshd[6756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:17.798000 audit[6756]: USER_AUTH pid=6756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:17.890443 kernel: audit: type=1100 audit(1712958677.798:1536): pid=6756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:19.446451 sshd[6756]: Failed password for root from 183.81.169.238 port 33796 ssh2 Apr 12 21:51:19.953268 sshd[6756]: Connection closed by authenticating user root 183.81.169.238 port 33796 [preauth] Apr 12 21:51:19.955869 systemd[1]: sshd@24-145.40.90.149:22-183.81.169.238:33796.service: Deactivated successfully. Apr 12 21:51:19.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.149:22-183.81.169.238:33796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:20.048290 kernel: audit: type=1131 audit(1712958679.955:1537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.149:22-183.81.169.238:33796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:20.099598 systemd[1]: Started sshd@25-145.40.90.149:22-183.81.169.238:33804.service. Apr 12 21:51:20.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.149:22-183.81.169.238:33804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:20.191457 kernel: audit: type=1130 audit(1712958680.098:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.149:22-183.81.169.238:33804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:21.025981 sshd[6761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:21.025000 audit[6761]: USER_AUTH pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:21.118289 kernel: audit: type=1100 audit(1712958681.025:1539): pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:22.888698 sshd[6761]: Failed password for root from 183.81.169.238 port 33804 ssh2 Apr 12 21:51:23.179210 sshd[6761]: Connection closed by authenticating user root 183.81.169.238 port 33804 [preauth] Apr 12 21:51:23.181679 systemd[1]: sshd@25-145.40.90.149:22-183.81.169.238:33804.service: Deactivated successfully. Apr 12 21:51:23.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.149:22-183.81.169.238:33804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:23.278452 kernel: audit: type=1131 audit(1712958683.181:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.149:22-183.81.169.238:33804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:23.321562 systemd[1]: Started sshd@26-145.40.90.149:22-183.81.169.238:33820.service. Apr 12 21:51:23.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.149:22-183.81.169.238:33820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:23.412295 kernel: audit: type=1130 audit(1712958683.320:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.149:22-183.81.169.238:33820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:24.361917 sshd[6766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:24.361000 audit[6766]: USER_AUTH pid=6766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:24.455427 kernel: audit: type=1100 audit(1712958684.361:1542): pid=6766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:26.635512 sshd[6766]: Failed password for root from 183.81.169.238 port 33820 ssh2 Apr 12 21:51:28.521833 sshd[6766]: Connection closed by authenticating user root 183.81.169.238 port 33820 [preauth] Apr 12 21:51:28.524391 systemd[1]: sshd@26-145.40.90.149:22-183.81.169.238:33820.service: Deactivated successfully. Apr 12 21:51:28.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.149:22-183.81.169.238:33820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:28.617306 kernel: audit: type=1131 audit(1712958688.524:1543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.149:22-183.81.169.238:33820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:28.669194 systemd[1]: Started sshd@27-145.40.90.149:22-183.81.169.238:34990.service. Apr 12 21:51:28.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.149:22-183.81.169.238:34990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:28.760441 kernel: audit: type=1130 audit(1712958688.669:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.149:22-183.81.169.238:34990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:29.426845 sshd[6777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.81.169.238 user=root Apr 12 21:51:29.426000 audit[6777]: USER_AUTH pid=6777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:29.519321 kernel: audit: type=1100 audit(1712958689.426:1545): pid=6777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=183.81.169.238 addr=183.81.169.238 terminal=ssh res=failed' Apr 12 21:51:31.053761 sshd[6777]: Failed password for root from 183.81.169.238 port 34990 ssh2 Apr 12 21:51:31.581363 sshd[6777]: Connection closed by authenticating user root 183.81.169.238 port 34990 [preauth] Apr 12 21:51:31.584022 systemd[1]: sshd@27-145.40.90.149:22-183.81.169.238:34990.service: Deactivated successfully. Apr 12 21:51:31.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.149:22-183.81.169.238:34990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:51:31.676234 kernel: audit: type=1131 audit(1712958691.584:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.149:22-183.81.169.238:34990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:52:08.030000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.030000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a2f8a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:08.249332 kernel: audit: type=1400 audit(1712958728.030:1547): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.249393 kernel: audit: type=1300 audit(1712958728.030:1547): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a2f8a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:08.249410 kernel: audit: type=1327 audit(1712958728.030:1547): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:08.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:08.344079 kernel: audit: type=1400 audit(1712958728.030:1548): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.030000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.436683 kernel: audit: type=1300 audit(1712958728.030:1548): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00145f770 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:08.030000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00145f770 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:08.558796 kernel: audit: type=1327 audit(1712958728.030:1548): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:08.030000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:08.653302 kernel: audit: type=1400 audit(1712958728.097:1549): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.746010 kernel: audit: type=1300 audit(1712958728.097:1549): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008035ce0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.097000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008035ce0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.845537 kernel: audit: type=1327 audit(1712958728.097:1549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:08.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:08.939907 kernel: audit: type=1400 audit(1712958728.097:1550): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01521c480 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:08.097000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0125f91a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:08.097000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011baeed0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:08.097000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0145d2c40 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:08.097000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:08.097000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007c79fc0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:52:08.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:52:10.914000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:10.914000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010ef9c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:10.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:10.914000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:10.914000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013c97a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:10.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:10.914000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:10.914000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a2fdc0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:10.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:10.915000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:52:10.915000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1cd40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:52:10.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:52:14.820000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:52:14.848815 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:52:14.848891 kernel: audit: type=1400 audit(1712958734.820:1559): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:52:14.820000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a80020 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:52:15.042246 kernel: audit: type=1300 audit(1712958734.820:1559): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a80020 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:52:15.042321 kernel: audit: type=1327 audit(1712958734.820:1559): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:52:14.820000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:52:14.971000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:52:15.233392 kernel: audit: type=1400 audit(1712958734.971:1560): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:52:15.233463 kernel: audit: type=1300 audit(1712958734.971:1560): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ebb5c0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:52:14.971000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ebb5c0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:52:15.330119 kernel: audit: type=1327 audit(1712958734.971:1560): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:52:14.971000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:52:33.690953 systemd[1]: Started sshd@28-145.40.90.149:22-149.202.90.68:34222.service. Apr 12 21:52:33.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.149:22-149.202.90.68:34222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:52:33.783297 kernel: audit: type=1130 audit(1712958753.691:1561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.149:22-149.202.90.68:34222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:52:34.307697 sshd[7053]: Invalid user ubuntu from 149.202.90.68 port 34222 Apr 12 21:52:34.457760 sshd[7053]: pam_faillock(sshd:auth): User unknown Apr 12 21:52:34.459020 sshd[7053]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:52:34.459119 sshd[7053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.90.68 Apr 12 21:52:34.460098 sshd[7053]: pam_faillock(sshd:auth): User unknown Apr 12 21:52:34.460000 audit[7053]: USER_AUTH pid=7053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=149.202.90.68 addr=149.202.90.68 terminal=ssh res=failed' Apr 12 21:52:34.552451 kernel: audit: type=1100 audit(1712958754.460:1562): pid=7053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=149.202.90.68 addr=149.202.90.68 terminal=ssh res=failed' Apr 12 21:52:37.010444 sshd[7053]: Failed password for invalid user ubuntu from 149.202.90.68 port 34222 ssh2 Apr 12 21:52:37.938601 sshd[7053]: Connection closed by invalid user ubuntu 149.202.90.68 port 34222 [preauth] Apr 12 21:52:37.941212 systemd[1]: sshd@28-145.40.90.149:22-149.202.90.68:34222.service: Deactivated successfully. Apr 12 21:52:37.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.149:22-149.202.90.68:34222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:52:38.033454 kernel: audit: type=1131 audit(1712958757.941:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.149:22-149.202.90.68:34222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:53:08.031000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.031000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d0f200 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:08.246854 kernel: audit: type=1400 audit(1712958788.031:1564): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.246902 kernel: audit: type=1300 audit(1712958788.031:1564): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d0f200 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:08.246921 kernel: audit: type=1327 audit(1712958788.031:1564): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:08.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:08.340195 kernel: audit: type=1400 audit(1712958788.031:1565): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.031000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.430396 kernel: audit: type=1300 audit(1712958788.031:1565): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f1cb40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:08.031000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f1cb40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:08.550852 kernel: audit: type=1327 audit(1712958788.031:1565): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:08.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.735936 kernel: audit: type=1400 audit(1712958788.098:1566): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.735969 kernel: audit: type=1300 audit(1712958788.098:1566): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c010805a70 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c010805a70 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.835055 kernel: audit: type=1327 audit(1712958788.098:1566): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:08.929187 kernel: audit: type=1400 audit(1712958788.098:1567): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c007abb290 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c010805ad0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006dbd680 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0084e36e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:08.098000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:08.098000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0036554c0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:53:08.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:53:10.915000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:10.915000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f1cd20 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:10.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:10.915000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:10.915000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00110e1e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:10.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:10.915000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:10.915000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013c97c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:10.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:10.916000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:53:10.916000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcefe0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:53:10.916000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:53:14.820000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:53:14.849533 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:53:14.849603 kernel: audit: type=1400 audit(1712958794.820:1576): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:53:14.820000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d040e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:53:15.043514 kernel: audit: type=1300 audit(1712958794.820:1576): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d040e0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:53:15.043596 kernel: audit: type=1327 audit(1712958794.820:1576): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:53:14.820000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:53:15.136806 kernel: audit: type=1400 audit(1712958794.970:1577): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:53:14.970000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:53:15.233352 kernel: audit: type=1300 audit(1712958794.970:1577): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db27c0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:53:14.970000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db27c0 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:53:15.330014 kernel: audit: type=1327 audit(1712958794.970:1577): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:53:14.970000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:54:08.033000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.033000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.216666 kernel: audit: type=1400 audit(1712958848.033:1578): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.216707 kernel: audit: type=1400 audit(1712958848.033:1579): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.216744 kernel: audit: type=1300 audit(1712958848.033:1578): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e80060 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:08.033000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e80060 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:08.337195 kernel: audit: type=1327 audit(1712958848.033:1578): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:08.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:08.430340 kernel: audit: type=1300 audit(1712958848.033:1579): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dce9c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:08.033000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dce9c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:08.550769 kernel: audit: type=1327 audit(1712958848.033:1579): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:08.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.735159 kernel: audit: type=1400 audit(1712958848.099:1580): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.735193 kernel: audit: type=1300 audit(1712958848.099:1580): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c8d13e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c8d13e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.833549 kernel: audit: type=1327 audit(1712958848.099:1580): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:08.927118 kernel: audit: type=1400 audit(1712958848.099:1581): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0144acf00 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01310a660 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c01324e300 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c010e79b60 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0093fdf80 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:54:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:54:10.917000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:10.917000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcef60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:10.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:10.917000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:10.917000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b0cda0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:10.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:10.917000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:10.917000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:54:10.917000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000dcefa0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:10.917000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a2e000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:54:10.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:10.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:54:14.822000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:54:14.850066 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:54:14.850109 kernel: audit: type=1400 audit(1712958854.822:1590): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:54:14.822000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b0180 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:54:15.044391 kernel: audit: type=1300 audit(1712958854.822:1590): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b0180 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:54:15.044428 kernel: audit: type=1327 audit(1712958854.822:1590): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:54:14.822000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:54:15.138980 kernel: audit: type=1400 audit(1712958854.972:1591): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:54:14.972000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:54:15.235858 kernel: audit: type=1300 audit(1712958854.972:1591): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db3540 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:54:14.972000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db3540 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:54:15.332441 kernel: audit: type=1327 audit(1712958854.972:1591): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:54:14.972000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:55:08.034000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.034000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e81200 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:08.248062 kernel: audit: type=1400 audit(1712958908.034:1592): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.248105 kernel: audit: type=1300 audit(1712958908.034:1592): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e81200 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:08.248122 kernel: audit: type=1327 audit(1712958908.034:1592): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:08.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:08.341176 kernel: audit: type=1400 audit(1712958908.034:1593): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.034000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.431144 kernel: audit: type=1300 audit(1712958908.034:1593): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017adf20 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:08.034000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017adf20 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:08.551417 kernel: audit: type=1327 audit(1712958908.034:1593): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:08.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:08.644639 kernel: audit: type=1400 audit(1712958908.099:1594): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00d0d1f50 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.834401 kernel: audit: type=1300 audit(1712958908.099:1594): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00d0d1f50 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.834437 kernel: audit: type=1327 audit(1712958908.099:1594): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:08.927795 kernel: audit: type=1400 audit(1712958908.099:1595): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01363a480 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c01363a4b0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c006b4aa60 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011283200 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006c2e840 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:55:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:55:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00147ff40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000500260 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:55:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00147ff60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1d4c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:55:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:55:14.822000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:55:14.850822 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:55:14.850862 kernel: audit: type=1400 audit(1712958914.822:1604): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:55:14.822000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c926c0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:55:14.947269 kernel: audit: type=1300 audit(1712958914.822:1604): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c926c0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:55:14.822000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:55:15.138705 kernel: audit: type=1327 audit(1712958914.822:1604): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:55:15.138774 kernel: audit: type=1400 audit(1712958914.973:1605): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:55:14.973000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:55:14.973000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016ec620 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:55:15.332129 kernel: audit: type=1300 audit(1712958914.973:1605): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016ec620 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:55:15.332179 kernel: audit: type=1327 audit(1712958914.973:1605): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:55:14.973000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:56:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a99da0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:08.249367 kernel: audit: type=1400 audit(1712958968.035:1606): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.249454 kernel: audit: type=1300 audit(1712958968.035:1606): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a99da0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:08.249486 kernel: audit: type=1327 audit(1712958968.035:1606): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:08.342573 kernel: audit: type=1400 audit(1712958968.035:1607): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019a4c40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:08.552857 kernel: audit: type=1300 audit(1712958968.035:1607): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019a4c40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:08.552894 kernel: audit: type=1327 audit(1712958968.035:1607): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.737367 kernel: audit: type=1400 audit(1712958968.100:1609): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.737401 kernel: audit: type=1400 audit(1712958968.100:1608): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.827308 kernel: audit: type=1300 audit(1712958968.100:1609): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0075796e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0075796e0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.925727 kernel: audit: type=1300 audit(1712958968.100:1608): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0093fc040 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0093fc040 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:56:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:56:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00c1982c0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:56:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0066f6600 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:56:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007579710 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:56:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00bd3acc0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:56:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:56:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2f6a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2f6c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ba5600 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:56:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0019a5da0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:56:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:56:14.824000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:56:14.852121 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:56:14.852207 kernel: audit: type=1400 audit(1712958974.824:1618): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:56:14.824000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b0440 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:56:15.046079 kernel: audit: type=1300 audit(1712958974.824:1618): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b0440 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:56:15.046172 kernel: audit: type=1327 audit(1712958974.824:1618): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:56:14.824000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:56:15.140901 kernel: audit: type=1400 audit(1712958974.973:1619): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:56:14.973000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:56:15.238197 kernel: audit: type=1300 audit(1712958974.973:1619): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016ec080 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:56:14.973000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016ec080 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:56:15.335644 kernel: audit: type=1327 audit(1712958974.973:1619): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:56:14.973000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:57:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012ca660 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:08.252072 kernel: audit: type=1400 audit(1712959028.035:1620): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.252125 kernel: audit: type=1300 audit(1712959028.035:1620): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012ca660 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:08.252145 kernel: audit: type=1327 audit(1712959028.035:1620): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:08.346107 kernel: audit: type=1400 audit(1712959028.035:1621): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.436970 kernel: audit: type=1300 audit(1712959028.035:1621): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a2ed40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a2ed40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:08.558317 kernel: audit: type=1327 audit(1712959028.035:1621): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.744223 kernel: audit: type=1400 audit(1712959028.099:1622): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.744269 kernel: audit: type=1300 audit(1712959028.099:1622): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0096e3ce0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0096e3ce0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.843172 kernel: audit: type=1327 audit(1712959028.099:1622): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:08.936913 kernel: audit: type=1400 audit(1712959028.099:1623): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c007363e40 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c005ca7800 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007363e80 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00915ab40 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:08.099000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:08.099000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c005ca7830 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:57:08.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:57:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010eee60 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001627e80 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa9000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:10.918000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:57:10.918000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000dce000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:57:10.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:57:14.824000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:57:14.852580 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:57:14.852661 kernel: audit: type=1400 audit(1712959034.824:1632): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:57:14.824000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b1aa0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:57:14.948282 kernel: audit: type=1300 audit(1712959034.824:1632): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b1aa0 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:57:14.824000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:57:15.139607 kernel: audit: type=1327 audit(1712959034.824:1632): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:57:15.139644 kernel: audit: type=1400 audit(1712959035.044:1633): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:57:15.044000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:57:15.234766 kernel: audit: type=1300 audit(1712959035.044:1633): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a00020 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:57:15.044000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a00020 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:57:15.331987 kernel: audit: type=1327 audit(1712959035.044:1633): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:57:15.044000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:57:33.983821 update_engine[1464]: I0412 21:57:33.983601 1464 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 21:57:33.983821 update_engine[1464]: I0412 21:57:33.983680 1464 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 21:57:33.985685 update_engine[1464]: I0412 21:57:33.985603 1464 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 21:57:33.986630 update_engine[1464]: I0412 21:57:33.986550 1464 omaha_request_params.cc:62] Current group set to lts Apr 12 21:57:33.986879 update_engine[1464]: I0412 21:57:33.986848 1464 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 21:57:33.986879 update_engine[1464]: I0412 21:57:33.986871 1464 update_attempter.cc:643] Scheduling an action processor start. Apr 12 21:57:33.987219 update_engine[1464]: I0412 21:57:33.986904 1464 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 21:57:33.987219 update_engine[1464]: I0412 21:57:33.986969 1464 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 21:57:33.987219 update_engine[1464]: I0412 21:57:33.987109 1464 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 21:57:33.987219 update_engine[1464]: I0412 21:57:33.987126 1464 omaha_request_action.cc:271] Request: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: Apr 12 21:57:33.987219 update_engine[1464]: I0412 21:57:33.987138 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:57:33.988526 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 21:57:33.990348 update_engine[1464]: I0412 21:57:33.990298 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:57:33.990566 update_engine[1464]: E0412 21:57:33.990525 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:57:33.990713 update_engine[1464]: I0412 21:57:33.990685 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 21:57:43.989443 update_engine[1464]: I0412 21:57:43.989292 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:57:43.990381 update_engine[1464]: I0412 21:57:43.989770 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:57:43.990381 update_engine[1464]: E0412 21:57:43.990001 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:57:43.990381 update_engine[1464]: I0412 21:57:43.990200 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 21:57:53.989429 update_engine[1464]: I0412 21:57:53.989356 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:57:53.990753 update_engine[1464]: I0412 21:57:53.989809 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:57:53.990753 update_engine[1464]: E0412 21:57:53.990005 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:57:53.990753 update_engine[1464]: I0412 21:57:53.990175 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 21:58:03.981184 update_engine[1464]: I0412 21:58:03.981070 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:58:03.982157 update_engine[1464]: I0412 21:58:03.981621 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:58:03.982157 update_engine[1464]: E0412 21:58:03.981834 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:58:03.982157 update_engine[1464]: I0412 21:58:03.981992 1464 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 21:58:03.982157 update_engine[1464]: I0412 21:58:03.982008 1464 omaha_request_action.cc:621] Omaha request response: Apr 12 21:58:03.982157 update_engine[1464]: E0412 21:58:03.982153 1464 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982182 1464 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982192 1464 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982200 1464 update_attempter.cc:306] Processing Done. Apr 12 21:58:03.982699 update_engine[1464]: E0412 21:58:03.982254 1464 update_attempter.cc:619] Update failed. Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982266 1464 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982275 1464 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982285 1464 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982434 1464 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982486 1464 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982496 1464 omaha_request_action.cc:271] Request: Apr 12 21:58:03.982699 update_engine[1464]: Apr 12 21:58:03.982699 update_engine[1464]: Apr 12 21:58:03.982699 update_engine[1464]: Apr 12 21:58:03.982699 update_engine[1464]: Apr 12 21:58:03.982699 update_engine[1464]: Apr 12 21:58:03.982699 update_engine[1464]: Apr 12 21:58:03.982699 update_engine[1464]: I0412 21:58:03.982506 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.982797 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 21:58:03.984525 update_engine[1464]: E0412 21:58:03.982964 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983101 1464 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983115 1464 omaha_request_action.cc:621] Omaha request response: Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983126 1464 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983134 1464 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983142 1464 update_attempter.cc:306] Processing Done. Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983150 1464 update_attempter.cc:310] Error event sent. Apr 12 21:58:03.984525 update_engine[1464]: I0412 21:58:03.983170 1464 update_check_scheduler.cc:74] Next update check in 40m47s Apr 12 21:58:03.985529 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 21:58:03.985529 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 21:58:05.515238 systemd[1]: Started sshd@29-145.40.90.149:22-149.202.90.68:43058.service. Apr 12 21:58:05.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.149:22-149.202.90.68:43058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:58:05.606236 kernel: audit: type=1130 audit(1712959085.514:1634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.149:22-149.202.90.68:43058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:58:06.115568 sshd[8363]: Invalid user user from 149.202.90.68 port 43058 Apr 12 21:58:06.263431 sshd[8363]: pam_faillock(sshd:auth): User unknown Apr 12 21:58:06.264587 sshd[8363]: pam_unix(sshd:auth): check pass; user unknown Apr 12 21:58:06.264685 sshd[8363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.90.68 Apr 12 21:58:06.265638 sshd[8363]: pam_faillock(sshd:auth): User unknown Apr 12 21:58:06.264000 audit[8363]: USER_AUTH pid=8363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=149.202.90.68 addr=149.202.90.68 terminal=ssh res=failed' Apr 12 21:58:06.361467 kernel: audit: type=1100 audit(1712959086.264:1635): pid=8363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=149.202.90.68 addr=149.202.90.68 terminal=ssh res=failed' Apr 12 21:58:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e80120 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:08.250684 kernel: audit: type=1400 audit(1712959088.035:1636): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.250737 kernel: audit: type=1300 audit(1712959088.035:1636): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e80120 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:08.250756 kernel: audit: type=1327 audit(1712959088.035:1636): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:08.343875 kernel: audit: type=1400 audit(1712959088.035:1637): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.393354 sshd[8363]: Failed password for invalid user user from 149.202.90.68 port 43058 ssh2 Apr 12 21:58:08.434111 kernel: audit: type=1300 audit(1712959088.035:1637): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcfd40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dcfd40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:08.554628 kernel: audit: type=1327 audit(1712959088.035:1637): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:08.647944 kernel: audit: type=1400 audit(1712959088.100:1638): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.739698 kernel: audit: type=1300 audit(1712959088.100:1638): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01449b740 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01449b740 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:58:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01324f3b0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:58:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006518040 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:58:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0061fbc20 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:58:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01324f410 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:58:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011bafd70 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:58:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:58:10.366624 sshd[8363]: Connection closed by invalid user user 149.202.90.68 port 43058 [preauth] Apr 12 21:58:10.369185 systemd[1]: sshd@29-145.40.90.149:22-149.202.90.68:43058.service: Deactivated successfully. Apr 12 21:58:10.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.149:22-149.202.90.68:43058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:58:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:10.961729 kernel: kauditd_printk_skb: 17 callbacks suppressed Apr 12 21:58:10.961829 kernel: audit: type=1400 audit(1712959090.919:1645): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00147e2a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:11.176374 kernel: audit: type=1300 audit(1712959090.919:1645): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00147e2a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:11.176409 kernel: audit: type=1327 audit(1712959090.919:1645): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:11.270446 kernel: audit: type=1400 audit(1712959090.919:1646): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:11.361498 kernel: audit: type=1300 audit(1712959090.919:1646): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006bfe40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0006bfe40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:11.579423 kernel: audit: type=1327 audit(1712959090.919:1646): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:11.579460 kernel: audit: type=1400 audit(1712959090.919:1647): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:11.670485 kernel: audit: type=1300 audit(1712959090.919:1647): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00181a000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00181a000 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:11.791935 kernel: audit: type=1327 audit(1712959090.919:1647): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:11.886002 kernel: audit: type=1400 audit(1712959090.919:1648): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:10.919000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:58:10.919000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000500440 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:58:10.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:58:14.825000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:58:14.825000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d04060 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:58:14.825000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:58:15.044000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:58:15.044000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016ecb80 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:58:15.044000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:59:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.063998 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 21:59:08.064041 kernel: audit: type=1400 audit(1712959148.035:1651): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001082e70 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:08.158294 kernel: audit: type=1300 audit(1712959148.035:1651): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001082e70 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:08.371458 kernel: audit: type=1327 audit(1712959148.035:1651): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:08.371494 kernel: audit: type=1400 audit(1712959148.035:1652): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.035000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.461571 kernel: audit: type=1300 audit(1712959148.035:1652): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa9c40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:08.035000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa9c40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:08.582091 kernel: audit: type=1327 audit(1712959148.035:1652): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:08.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:08.675299 kernel: audit: type=1400 audit(1712959148.100:1653): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.766730 kernel: audit: type=1300 audit(1712959148.100:1653): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c1a4f00 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c1a4f00 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.866949 kernel: audit: type=1327 audit(1712959148.100:1653): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:08.960178 kernel: audit: type=1400 audit(1712959148.100:1654): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0100d4060 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c010804030 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006b4bfc0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00b894780 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.100000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c010804090 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 21:59:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 21:59:10.920000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:10.920000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017adda0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:10.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:10.920000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:10.920000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b0cba0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:10.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:10.921000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:10.921000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017adde0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:10.921000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:10.921000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:59:10.921000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015a34a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 21:59:10.921000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:59:14.825000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:59:14.854379 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 21:59:14.950217 kernel: audit: type=1400 audit(1712959154.825:1663): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 21:59:14.950265 kernel: audit: type=1300 audit(1712959154.825:1663): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001924380 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:59:14.825000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001924380 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 21:59:14.825000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:59:15.141215 kernel: audit: type=1327 audit(1712959154.825:1663): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:59:15.141301 kernel: audit: type=1400 audit(1712959155.045:1664): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:59:15.045000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 21:59:15.234996 kernel: audit: type=1300 audit(1712959155.045:1664): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000eba580 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:59:15.045000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000eba580 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 21:59:15.331317 kernel: audit: type=1327 audit(1712959155.045:1664): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:59:15.045000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:00:08.037000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.037000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013c97e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:08.251145 kernel: audit: type=1400 audit(1712959208.037:1665): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.251186 kernel: audit: type=1300 audit(1712959208.037:1665): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013c97e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:08.251203 kernel: audit: type=1327 audit(1712959208.037:1665): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:08.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:08.344360 kernel: audit: type=1400 audit(1712959208.037:1666): avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.037000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.435428 kernel: audit: type=1300 audit(1712959208.037:1666): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001060bd0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:08.037000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001060bd0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:08.555723 kernel: audit: type=1327 audit(1712959208.037:1666): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:08.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:08.649021 kernel: audit: type=1400 audit(1712959208.102:1667): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.739603 kernel: audit: type=1300 audit(1712959208.102:1667): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00219c510 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00219c510 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.837900 kernel: audit: type=1327 audit(1712959208.102:1667): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:08.931275 kernel: audit: type=1400 audit(1712959208.102:1668): avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0080e1140 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006fb6e00 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c3a57a0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00219c570 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c3a5830 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:00:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:00:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181b560 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00181b580 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013c9800 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:00:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001182f40 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:00:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:00:12.206142 systemd[1]: Starting systemd-tmpfiles-clean.service... Apr 12 22:00:12.212965 systemd-tmpfiles[8871]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 22:00:12.213210 systemd-tmpfiles[8871]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 22:00:12.213941 systemd-tmpfiles[8871]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 22:00:12.225556 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Apr 12 22:00:12.225643 systemd[1]: Finished systemd-tmpfiles-clean.service. Apr 12 22:00:12.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:12.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:12.227389 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Apr 12 22:00:14.827000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 22:00:14.855194 kernel: kauditd_printk_skb: 28 callbacks suppressed Apr 12 22:00:14.855245 kernel: audit: type=1400 audit(1712959214.827:1679): avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 22:00:14.827000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b0140 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 22:00:15.048211 kernel: audit: type=1300 audit(1712959214.827:1679): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b0140 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 22:00:15.048319 kernel: audit: type=1327 audit(1712959214.827:1679): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:00:14.827000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:00:15.141789 kernel: audit: type=1400 audit(1712959215.047:1680): avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 22:00:15.047000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 22:00:15.238474 kernel: audit: type=1300 audit(1712959215.047:1680): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a00140 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 22:00:15.047000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a00140 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 22:00:15.335114 kernel: audit: type=1327 audit(1712959215.047:1680): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:00:15.047000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:00:17.369950 systemd[1]: Started sshd@30-145.40.90.149:22-147.75.109.163:46044.service. Apr 12 22:00:17.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.149:22-147.75.109.163:46044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:17.461236 kernel: audit: type=1130 audit(1712959217.368:1681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.149:22-147.75.109.163:46044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:17.494000 audit[8903]: USER_ACCT pid=8903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.495783 sshd[8903]: Accepted publickey for core from 147.75.109.163 port 46044 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:17.499724 sshd[8903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:17.511527 systemd-logind[1462]: New session 10 of user core. Apr 12 22:00:17.514210 systemd[1]: Started session-10.scope. Apr 12 22:00:17.497000 audit[8903]: CRED_ACQ pid=8903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.605096 sshd[8903]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:17.606558 systemd[1]: sshd@30-145.40.90.149:22-147.75.109.163:46044.service: Deactivated successfully. Apr 12 22:00:17.606995 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 22:00:17.607280 systemd-logind[1462]: Session 10 logged out. Waiting for processes to exit. Apr 12 22:00:17.607811 systemd-logind[1462]: Removed session 10. Apr 12 22:00:17.679313 kernel: audit: type=1101 audit(1712959217.494:1682): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.679350 kernel: audit: type=1103 audit(1712959217.497:1683): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.679368 kernel: audit: type=1006 audit(1712959217.497:1684): pid=8903 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 22:00:17.497000 audit[8903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc9494240 a2=3 a3=0 items=0 ppid=1 pid=8903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:17.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:17.522000 audit[8903]: USER_START pid=8903 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.523000 audit[8905]: CRED_ACQ pid=8905 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.604000 audit[8903]: USER_END pid=8903 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.604000 audit[8903]: CRED_DISP pid=8903 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.149:22-147.75.109.163:46044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:22.615523 systemd[1]: Started sshd@31-145.40.90.149:22-147.75.109.163:46048.service. Apr 12 22:00:22.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.149:22-147.75.109.163:46048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:22.642557 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 22:00:22.642649 kernel: audit: type=1130 audit(1712959222.614:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.149:22-147.75.109.163:46048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:22.763000 audit[8929]: USER_ACCT pid=8929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.764179 sshd[8929]: Accepted publickey for core from 147.75.109.163 port 46048 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:22.764740 sshd[8929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:22.766921 systemd-logind[1462]: New session 11 of user core. Apr 12 22:00:22.767384 systemd[1]: Started session-11.scope. Apr 12 22:00:22.848385 sshd[8929]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:22.849870 systemd[1]: sshd@31-145.40.90.149:22-147.75.109.163:46048.service: Deactivated successfully. Apr 12 22:00:22.850361 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 22:00:22.850812 systemd-logind[1462]: Session 11 logged out. Waiting for processes to exit. Apr 12 22:00:22.851232 systemd-logind[1462]: Removed session 11. Apr 12 22:00:22.763000 audit[8929]: CRED_ACQ pid=8929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.949120 kernel: audit: type=1101 audit(1712959222.763:1691): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.949160 kernel: audit: type=1103 audit(1712959222.763:1692): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.949177 kernel: audit: type=1006 audit(1712959222.763:1693): pid=8929 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 22:00:23.007679 kernel: audit: type=1300 audit(1712959222.763:1693): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2fc43710 a2=3 a3=0 items=0 ppid=1 pid=8929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.763000 audit[8929]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2fc43710 a2=3 a3=0 items=0 ppid=1 pid=8929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.099878 kernel: audit: type=1327 audit(1712959222.763:1693): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:22.763000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:23.130455 kernel: audit: type=1105 audit(1712959222.768:1694): pid=8929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.768000 audit[8929]: USER_START pid=8929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:23.225749 kernel: audit: type=1103 audit(1712959222.768:1695): pid=8931 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.768000 audit[8931]: CRED_ACQ pid=8931 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:23.315304 kernel: audit: type=1106 audit(1712959222.847:1696): pid=8929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.847000 audit[8929]: USER_END pid=8929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:23.411040 kernel: audit: type=1104 audit(1712959222.847:1697): pid=8929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.847000 audit[8929]: CRED_DISP pid=8929 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:22.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.149:22-147.75.109.163:46048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:27.858214 systemd[1]: Started sshd@32-145.40.90.149:22-147.75.109.163:49844.service. Apr 12 22:00:27.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.149:22-147.75.109.163:49844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:27.885981 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 22:00:27.886049 kernel: audit: type=1130 audit(1712959227.857:1699): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.149:22-147.75.109.163:49844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:28.009170 sshd[8963]: Accepted publickey for core from 147.75.109.163 port 49844 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:28.007000 audit[8963]: USER_ACCT pid=8963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.010256 sshd[8963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:28.012728 systemd-logind[1462]: New session 12 of user core. Apr 12 22:00:28.013170 systemd[1]: Started session-12.scope. Apr 12 22:00:28.091544 sshd[8963]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:28.092937 systemd[1]: sshd@32-145.40.90.149:22-147.75.109.163:49844.service: Deactivated successfully. Apr 12 22:00:28.093381 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 22:00:28.093733 systemd-logind[1462]: Session 12 logged out. Waiting for processes to exit. Apr 12 22:00:28.094156 systemd-logind[1462]: Removed session 12. Apr 12 22:00:28.008000 audit[8963]: CRED_ACQ pid=8963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.191381 kernel: audit: type=1101 audit(1712959228.007:1700): pid=8963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.191465 kernel: audit: type=1103 audit(1712959228.008:1701): pid=8963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.191516 kernel: audit: type=1006 audit(1712959228.008:1702): pid=8963 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 22:00:28.008000 audit[8963]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0082c0b0 a2=3 a3=0 items=0 ppid=1 pid=8963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:28.341883 kernel: audit: type=1300 audit(1712959228.008:1702): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0082c0b0 a2=3 a3=0 items=0 ppid=1 pid=8963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:28.341942 kernel: audit: type=1327 audit(1712959228.008:1702): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:28.008000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:28.013000 audit[8963]: USER_START pid=8963 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.466771 kernel: audit: type=1105 audit(1712959228.013:1703): pid=8963 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.466880 kernel: audit: type=1103 audit(1712959228.014:1704): pid=8965 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.014000 audit[8965]: CRED_ACQ pid=8965 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.090000 audit[8963]: USER_END pid=8963 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.651385 kernel: audit: type=1106 audit(1712959228.090:1705): pid=8963 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.651460 kernel: audit: type=1104 audit(1712959228.090:1706): pid=8963 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.090000 audit[8963]: CRED_DISP pid=8963 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:28.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.149:22-147.75.109.163:49844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:33.101910 systemd[1]: Started sshd@33-145.40.90.149:22-147.75.109.163:49852.service. Apr 12 22:00:33.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.149:22-147.75.109.163:49852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:33.128788 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 22:00:33.128908 kernel: audit: type=1130 audit(1712959233.100:1708): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.149:22-147.75.109.163:49852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:33.250000 audit[9016]: USER_ACCT pid=9016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.251755 sshd[9016]: Accepted publickey for core from 147.75.109.163 port 49852 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:33.253549 sshd[9016]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:33.256281 systemd-logind[1462]: New session 13 of user core. Apr 12 22:00:33.256868 systemd[1]: Started session-13.scope. Apr 12 22:00:33.338342 sshd[9016]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:33.340184 systemd[1]: sshd@33-145.40.90.149:22-147.75.109.163:49852.service: Deactivated successfully. Apr 12 22:00:33.340551 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 22:00:33.341043 systemd-logind[1462]: Session 13 logged out. Waiting for processes to exit. Apr 12 22:00:33.342705 systemd[1]: Started sshd@34-145.40.90.149:22-147.75.109.163:49862.service. Apr 12 22:00:33.252000 audit[9016]: CRED_ACQ pid=9016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.343333 systemd-logind[1462]: Removed session 13. Apr 12 22:00:33.433313 kernel: audit: type=1101 audit(1712959233.250:1709): pid=9016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.433377 kernel: audit: type=1103 audit(1712959233.252:1710): pid=9016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.433395 kernel: audit: type=1006 audit(1712959233.252:1711): pid=9016 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 22:00:33.491847 kernel: audit: type=1300 audit(1712959233.252:1711): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd61fbf3f0 a2=3 a3=0 items=0 ppid=1 pid=9016 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:33.252000 audit[9016]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd61fbf3f0 a2=3 a3=0 items=0 ppid=1 pid=9016 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:33.524563 sshd[9048]: Accepted publickey for core from 147.75.109.163 port 49862 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:33.525405 sshd[9048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:33.528131 systemd-logind[1462]: New session 14 of user core. Apr 12 22:00:33.528644 systemd[1]: Started session-14.scope. Apr 12 22:00:33.583631 kernel: audit: type=1327 audit(1712959233.252:1711): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:33.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:33.614117 kernel: audit: type=1105 audit(1712959233.258:1712): pid=9016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.258000 audit[9016]: USER_START pid=9016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.708454 kernel: audit: type=1103 audit(1712959233.258:1713): pid=9018 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.258000 audit[9018]: CRED_ACQ pid=9018 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.797564 kernel: audit: type=1106 audit(1712959233.337:1714): pid=9016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.337000 audit[9016]: USER_END pid=9016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.338000 audit[9016]: CRED_DISP pid=9016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.893235 kernel: audit: type=1104 audit(1712959233.338:1715): pid=9016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.959770 sshd[9048]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:33.961627 systemd[1]: sshd@34-145.40.90.149:22-147.75.109.163:49862.service: Deactivated successfully. Apr 12 22:00:33.962025 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 22:00:33.962476 systemd-logind[1462]: Session 14 logged out. Waiting for processes to exit. Apr 12 22:00:33.963144 systemd[1]: Started sshd@35-145.40.90.149:22-147.75.109.163:49872.service. Apr 12 22:00:33.963822 systemd-logind[1462]: Removed session 14. Apr 12 22:00:33.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.149:22-147.75.109.163:49852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:33.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.149:22-147.75.109.163:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:33.523000 audit[9048]: USER_ACCT pid=9048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.523000 audit[9048]: CRED_ACQ pid=9048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.523000 audit[9048]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7db18fe0 a2=3 a3=0 items=0 ppid=1 pid=9048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:33.523000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:33.529000 audit[9048]: USER_START pid=9048 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.530000 audit[9050]: CRED_ACQ pid=9050 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.959000 audit[9048]: USER_END pid=9048 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.959000 audit[9048]: CRED_DISP pid=9048 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:33.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.149:22-147.75.109.163:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:33.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.149:22-147.75.109.163:49872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:34.013000 audit[9071]: USER_ACCT pid=9071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:34.014860 sshd[9071]: Accepted publickey for core from 147.75.109.163 port 49872 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:34.014000 audit[9071]: CRED_ACQ pid=9071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:34.014000 audit[9071]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4336c020 a2=3 a3=0 items=0 ppid=1 pid=9071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:34.014000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:34.015551 sshd[9071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:34.017849 systemd-logind[1462]: New session 15 of user core. Apr 12 22:00:34.018324 systemd[1]: Started session-15.scope. Apr 12 22:00:34.019000 audit[9071]: USER_START pid=9071 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:34.019000 audit[9074]: CRED_ACQ pid=9074 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:34.129840 sshd[9071]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:34.129000 audit[9071]: USER_END pid=9071 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:34.129000 audit[9071]: CRED_DISP pid=9071 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:34.131339 systemd[1]: sshd@35-145.40.90.149:22-147.75.109.163:49872.service: Deactivated successfully. Apr 12 22:00:34.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.149:22-147.75.109.163:49872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:34.131787 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 22:00:34.132141 systemd-logind[1462]: Session 15 logged out. Waiting for processes to exit. Apr 12 22:00:34.132773 systemd-logind[1462]: Removed session 15. Apr 12 22:00:39.140362 systemd[1]: Started sshd@36-145.40.90.149:22-147.75.109.163:33112.service. Apr 12 22:00:39.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.149:22-147.75.109.163:33112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:39.167290 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 22:00:39.167383 kernel: audit: type=1130 audit(1712959239.139:1735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.149:22-147.75.109.163:33112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:39.288000 audit[9106]: USER_ACCT pid=9106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.289743 sshd[9106]: Accepted publickey for core from 147.75.109.163 port 33112 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:39.290945 sshd[9106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:39.293509 systemd-logind[1462]: New session 16 of user core. Apr 12 22:00:39.293957 systemd[1]: Started session-16.scope. Apr 12 22:00:39.373715 sshd[9106]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:39.375183 systemd[1]: sshd@36-145.40.90.149:22-147.75.109.163:33112.service: Deactivated successfully. Apr 12 22:00:39.375648 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 22:00:39.376002 systemd-logind[1462]: Session 16 logged out. Waiting for processes to exit. Apr 12 22:00:39.376518 systemd-logind[1462]: Removed session 16. Apr 12 22:00:39.289000 audit[9106]: CRED_ACQ pid=9106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.471394 kernel: audit: type=1101 audit(1712959239.288:1736): pid=9106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.471434 kernel: audit: type=1103 audit(1712959239.289:1737): pid=9106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.471451 kernel: audit: type=1006 audit(1712959239.289:1738): pid=9106 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 22:00:39.529962 kernel: audit: type=1300 audit(1712959239.289:1738): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc5a98600 a2=3 a3=0 items=0 ppid=1 pid=9106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:39.289000 audit[9106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc5a98600 a2=3 a3=0 items=0 ppid=1 pid=9106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:39.621876 kernel: audit: type=1327 audit(1712959239.289:1738): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:39.289000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:39.652375 kernel: audit: type=1105 audit(1712959239.295:1739): pid=9106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.295000 audit[9106]: USER_START pid=9106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.746839 kernel: audit: type=1103 audit(1712959239.295:1740): pid=9108 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.295000 audit[9108]: CRED_ACQ pid=9108 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.836068 kernel: audit: type=1106 audit(1712959239.373:1741): pid=9106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.373000 audit[9106]: USER_END pid=9106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.931587 kernel: audit: type=1104 audit(1712959239.373:1742): pid=9106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.373000 audit[9106]: CRED_DISP pid=9106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:39.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.149:22-147.75.109.163:33112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:44.384422 systemd[1]: Started sshd@37-145.40.90.149:22-147.75.109.163:33124.service. Apr 12 22:00:44.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.149:22-147.75.109.163:33124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:44.411804 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 22:00:44.411866 kernel: audit: type=1130 audit(1712959244.383:1744): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.149:22-147.75.109.163:33124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:44.532000 audit[9189]: USER_ACCT pid=9189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.533910 sshd[9189]: Accepted publickey for core from 147.75.109.163 port 33124 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:44.535061 sshd[9189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:44.537924 systemd-logind[1462]: New session 17 of user core. Apr 12 22:00:44.538487 systemd[1]: Started session-17.scope. Apr 12 22:00:44.618846 sshd[9189]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:44.620412 systemd[1]: sshd@37-145.40.90.149:22-147.75.109.163:33124.service: Deactivated successfully. Apr 12 22:00:44.620842 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 22:00:44.621316 systemd-logind[1462]: Session 17 logged out. Waiting for processes to exit. Apr 12 22:00:44.621843 systemd-logind[1462]: Removed session 17. Apr 12 22:00:44.533000 audit[9189]: CRED_ACQ pid=9189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.715719 kernel: audit: type=1101 audit(1712959244.532:1745): pid=9189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.715760 kernel: audit: type=1103 audit(1712959244.533:1746): pid=9189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.715779 kernel: audit: type=1006 audit(1712959244.533:1747): pid=9189 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 22:00:44.774269 kernel: audit: type=1300 audit(1712959244.533:1747): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda5f67950 a2=3 a3=0 items=0 ppid=1 pid=9189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:44.533000 audit[9189]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda5f67950 a2=3 a3=0 items=0 ppid=1 pid=9189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:44.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:44.867235 kernel: audit: type=1327 audit(1712959244.533:1747): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:44.539000 audit[9189]: USER_START pid=9189 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.991317 kernel: audit: type=1105 audit(1712959244.539:1748): pid=9189 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.991355 kernel: audit: type=1103 audit(1712959244.540:1749): pid=9191 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.540000 audit[9191]: CRED_ACQ pid=9191 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:45.080582 kernel: audit: type=1106 audit(1712959244.618:1750): pid=9189 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.618000 audit[9189]: USER_END pid=9189 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:45.176122 kernel: audit: type=1104 audit(1712959244.618:1751): pid=9189 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.618000 audit[9189]: CRED_DISP pid=9189 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:44.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.149:22-147.75.109.163:33124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:49.625608 systemd[1]: Started sshd@38-145.40.90.149:22-147.75.109.163:59650.service. Apr 12 22:00:49.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.149:22-147.75.109.163:59650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:49.653521 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 22:00:49.653619 kernel: audit: type=1130 audit(1712959249.625:1753): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.149:22-147.75.109.163:59650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:49.687833 sshd[9219]: Accepted publickey for core from 147.75.109.163 port 59650 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:49.689096 sshd[9219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:49.691478 systemd-logind[1462]: New session 18 of user core. Apr 12 22:00:49.692040 systemd[1]: Started session-18.scope. Apr 12 22:00:49.687000 audit[9219]: USER_ACCT pid=9219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.770764 sshd[9219]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:49.772229 systemd[1]: sshd@38-145.40.90.149:22-147.75.109.163:59650.service: Deactivated successfully. Apr 12 22:00:49.772681 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 22:00:49.773027 systemd-logind[1462]: Session 18 logged out. Waiting for processes to exit. Apr 12 22:00:49.773476 systemd-logind[1462]: Removed session 18. Apr 12 22:00:49.832793 kernel: audit: type=1101 audit(1712959249.687:1754): pid=9219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.832867 kernel: audit: type=1103 audit(1712959249.688:1755): pid=9219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.688000 audit[9219]: CRED_ACQ pid=9219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.981854 kernel: audit: type=1006 audit(1712959249.688:1756): pid=9219 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 22:00:49.981888 kernel: audit: type=1300 audit(1712959249.688:1756): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdac0b2820 a2=3 a3=0 items=0 ppid=1 pid=9219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:49.688000 audit[9219]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdac0b2820 a2=3 a3=0 items=0 ppid=1 pid=9219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:50.073831 kernel: audit: type=1327 audit(1712959249.688:1756): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:49.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:50.104315 kernel: audit: type=1105 audit(1712959249.693:1757): pid=9219 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.693000 audit[9219]: USER_START pid=9219 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:50.198818 kernel: audit: type=1103 audit(1712959249.694:1758): pid=9221 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.694000 audit[9221]: CRED_ACQ pid=9221 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:50.288096 kernel: audit: type=1106 audit(1712959249.771:1759): pid=9219 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.771000 audit[9219]: USER_END pid=9219 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:50.383640 kernel: audit: type=1104 audit(1712959249.771:1760): pid=9219 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.771000 audit[9219]: CRED_DISP pid=9219 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:49.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.149:22-147.75.109.163:59650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:54.782673 systemd[1]: Started sshd@39-145.40.90.149:22-147.75.109.163:59664.service. Apr 12 22:00:54.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.149:22-147.75.109.163:59664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:54.826514 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 22:00:54.826613 kernel: audit: type=1130 audit(1712959254.782:1762): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.149:22-147.75.109.163:59664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:54.947000 audit[9245]: USER_ACCT pid=9245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:54.947975 sshd[9245]: Accepted publickey for core from 147.75.109.163 port 59664 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:54.949552 sshd[9245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:54.952139 systemd-logind[1462]: New session 19 of user core. Apr 12 22:00:54.952680 systemd[1]: Started session-19.scope. Apr 12 22:00:55.032304 sshd[9245]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:55.034256 systemd[1]: sshd@39-145.40.90.149:22-147.75.109.163:59664.service: Deactivated successfully. Apr 12 22:00:55.034586 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 22:00:55.034966 systemd-logind[1462]: Session 19 logged out. Waiting for processes to exit. Apr 12 22:00:55.035501 systemd[1]: Started sshd@40-145.40.90.149:22-147.75.109.163:59672.service. Apr 12 22:00:55.035925 systemd-logind[1462]: Removed session 19. Apr 12 22:00:54.949000 audit[9245]: CRED_ACQ pid=9245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.129692 kernel: audit: type=1101 audit(1712959254.947:1763): pid=9245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.129745 kernel: audit: type=1103 audit(1712959254.949:1764): pid=9245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.129766 kernel: audit: type=1006 audit(1712959254.949:1765): pid=9245 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 22:00:55.188287 kernel: audit: type=1300 audit(1712959254.949:1765): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0b5669f0 a2=3 a3=0 items=0 ppid=1 pid=9245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:54.949000 audit[9245]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0b5669f0 a2=3 a3=0 items=0 ppid=1 pid=9245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:55.221186 sshd[9270]: Accepted publickey for core from 147.75.109.163 port 59672 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:55.223547 sshd[9270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:55.225858 systemd-logind[1462]: New session 20 of user core. Apr 12 22:00:55.226466 systemd[1]: Started session-20.scope. Apr 12 22:00:54.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:55.310791 kernel: audit: type=1327 audit(1712959254.949:1765): proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:55.310874 kernel: audit: type=1105 audit(1712959254.954:1766): pid=9245 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:54.954000 audit[9245]: USER_START pid=9245 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:54.955000 audit[9247]: CRED_ACQ pid=9247 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.455630 sshd[9270]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:55.457545 systemd[1]: sshd@40-145.40.90.149:22-147.75.109.163:59672.service: Deactivated successfully. Apr 12 22:00:55.457891 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 22:00:55.458199 systemd-logind[1462]: Session 20 logged out. Waiting for processes to exit. Apr 12 22:00:55.458781 systemd[1]: Started sshd@41-145.40.90.149:22-147.75.109.163:59688.service. Apr 12 22:00:55.459125 systemd-logind[1462]: Removed session 20. Apr 12 22:00:55.494582 kernel: audit: type=1103 audit(1712959254.955:1767): pid=9247 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.494649 kernel: audit: type=1106 audit(1712959255.032:1768): pid=9245 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.032000 audit[9245]: USER_END pid=9245 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.590095 kernel: audit: type=1104 audit(1712959255.032:1769): pid=9245 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.032000 audit[9245]: CRED_DISP pid=9245 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.622917 sshd[9300]: Accepted publickey for core from 147.75.109.163 port 59688 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:55.624581 sshd[9300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:55.626827 systemd-logind[1462]: New session 21 of user core. Apr 12 22:00:55.627334 systemd[1]: Started session-21.scope. Apr 12 22:00:55.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.149:22-147.75.109.163:59664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:55.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.149:22-147.75.109.163:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:55.220000 audit[9270]: USER_ACCT pid=9270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.223000 audit[9270]: CRED_ACQ pid=9270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.223000 audit[9270]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff99ed1fb0 a2=3 a3=0 items=0 ppid=1 pid=9270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:55.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:55.228000 audit[9270]: USER_START pid=9270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.228000 audit[9275]: CRED_ACQ pid=9275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.456000 audit[9270]: USER_END pid=9270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.456000 audit[9270]: CRED_DISP pid=9270 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.149:22-147.75.109.163:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:55.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.149:22-147.75.109.163:59688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:55.622000 audit[9300]: USER_ACCT pid=9300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.624000 audit[9300]: CRED_ACQ pid=9300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.624000 audit[9300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5c716c0 a2=3 a3=0 items=0 ppid=1 pid=9300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:55.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:55.629000 audit[9300]: USER_START pid=9300 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:55.629000 audit[9320]: CRED_ACQ pid=9320 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.450000 audit[9347]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=9347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.450000 audit[9347]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff8c6d3970 a2=0 a3=7fff8c6d395c items=0 ppid=2819 pid=9347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.458000 audit[9347]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=9347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.458000 audit[9347]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff8c6d3970 a2=0 a3=0 items=0 ppid=2819 pid=9347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.460915 sshd[9300]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:56.461000 audit[9300]: USER_END pid=9300 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.461000 audit[9300]: CRED_DISP pid=9300 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.463133 systemd[1]: sshd@41-145.40.90.149:22-147.75.109.163:59688.service: Deactivated successfully. Apr 12 22:00:56.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.149:22-147.75.109.163:59688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:56.463826 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 22:00:56.464378 systemd-logind[1462]: Session 21 logged out. Waiting for processes to exit. Apr 12 22:00:56.465329 systemd[1]: Started sshd@42-145.40.90.149:22-147.75.109.163:59702.service. Apr 12 22:00:56.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.149:22-147.75.109.163:59702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:56.465937 systemd-logind[1462]: Removed session 21. Apr 12 22:00:56.476000 audit[9353]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=9353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.476000 audit[9353]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd06c18790 a2=0 a3=7ffd06c1877c items=0 ppid=2819 pid=9353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.476000 audit[9353]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=9353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.476000 audit[9353]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd06c18790 a2=0 a3=0 items=0 ppid=2819 pid=9353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.506000 audit[9350]: USER_ACCT pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.507625 sshd[9350]: Accepted publickey for core from 147.75.109.163 port 59702 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:56.509000 audit[9350]: CRED_ACQ pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.510000 audit[9350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe774db170 a2=3 a3=0 items=0 ppid=1 pid=9350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.510000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:56.511087 sshd[9350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:56.522153 systemd-logind[1462]: New session 22 of user core. Apr 12 22:00:56.525150 systemd[1]: Started session-22.scope. Apr 12 22:00:56.541000 audit[9350]: USER_START pid=9350 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.545000 audit[9356]: CRED_ACQ pid=9356 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.769576 sshd[9350]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:56.770000 audit[9350]: USER_END pid=9350 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.770000 audit[9350]: CRED_DISP pid=9350 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.771576 systemd[1]: sshd@42-145.40.90.149:22-147.75.109.163:59702.service: Deactivated successfully. Apr 12 22:00:56.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.149:22-147.75.109.163:59702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:56.771926 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 22:00:56.772239 systemd-logind[1462]: Session 22 logged out. Waiting for processes to exit. Apr 12 22:00:56.772952 systemd[1]: Started sshd@43-145.40.90.149:22-147.75.109.163:59710.service. Apr 12 22:00:56.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.149:22-147.75.109.163:59710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:56.773395 systemd-logind[1462]: Removed session 22. Apr 12 22:00:56.812000 audit[9378]: USER_ACCT pid=9378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.812749 sshd[9378]: Accepted publickey for core from 147.75.109.163 port 59710 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:56.813000 audit[9378]: CRED_ACQ pid=9378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.813000 audit[9378]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6880ba20 a2=3 a3=0 items=0 ppid=1 pid=9378 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.813000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:56.813827 sshd[9378]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:56.817191 systemd-logind[1462]: New session 23 of user core. Apr 12 22:00:56.818440 systemd[1]: Started session-23.scope. Apr 12 22:00:56.823000 audit[9378]: USER_START pid=9378 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.824000 audit[9381]: CRED_ACQ pid=9381 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.967240 sshd[9378]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:56.967000 audit[9378]: USER_END pid=9378 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.967000 audit[9378]: CRED_DISP pid=9378 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:56.968781 systemd[1]: sshd@43-145.40.90.149:22-147.75.109.163:59710.service: Deactivated successfully. Apr 12 22:00:56.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.149:22-147.75.109.163:59710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:56.969262 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 22:00:56.969666 systemd-logind[1462]: Session 23 logged out. Waiting for processes to exit. Apr 12 22:00:56.970147 systemd-logind[1462]: Removed session 23. Apr 12 22:01:01.531000 audit[9431]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=9431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.558796 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 22:01:01.558845 kernel: audit: type=1325 audit(1712959261.531:1811): table=filter:131 family=2 entries=20 op=nft_register_rule pid=9431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.531000 audit[9431]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdca7d7d00 a2=0 a3=7ffdca7d7cec items=0 ppid=2819 pid=9431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.714314 kernel: audit: type=1300 audit(1712959261.531:1811): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdca7d7d00 a2=0 a3=7ffdca7d7cec items=0 ppid=2819 pid=9431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.714379 kernel: audit: type=1327 audit(1712959261.531:1811): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.778000 audit[9431]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=9431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.778000 audit[9431]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdca7d7d00 a2=0 a3=7ffdca7d7cec items=0 ppid=2819 pid=9431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.935924 kernel: audit: type=1325 audit(1712959261.778:1812): table=nat:132 family=2 entries=106 op=nft_register_chain pid=9431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.935966 kernel: audit: type=1300 audit(1712959261.778:1812): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdca7d7d00 a2=0 a3=7ffdca7d7cec items=0 ppid=2819 pid=9431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.935985 kernel: audit: type=1327 audit(1712959261.778:1812): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.996573 systemd[1]: Started sshd@44-145.40.90.149:22-147.75.109.163:38260.service. Apr 12 22:01:01.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.149:22-147.75.109.163:38260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:02.086305 kernel: audit: type=1130 audit(1712959261.995:1813): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.149:22-147.75.109.163:38260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:02.118000 audit[9434]: USER_ACCT pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.118643 sshd[9434]: Accepted publickey for core from 147.75.109.163 port 38260 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:01:02.119532 sshd[9434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:01:02.121603 systemd-logind[1462]: New session 24 of user core. Apr 12 22:01:02.122158 systemd[1]: Started session-24.scope. Apr 12 22:01:02.118000 audit[9434]: CRED_ACQ pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.302565 kernel: audit: type=1101 audit(1712959262.118:1814): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.302603 kernel: audit: type=1103 audit(1712959262.118:1815): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.302620 kernel: audit: type=1006 audit(1712959262.118:1816): pid=9434 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 22:01:02.118000 audit[9434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff71722680 a2=3 a3=0 items=0 ppid=1 pid=9434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:02.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:02.123000 audit[9434]: USER_START pid=9434 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.123000 audit[9436]: CRED_ACQ pid=9436 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.394621 sshd[9434]: pam_unix(sshd:session): session closed for user core Apr 12 22:01:02.394000 audit[9434]: USER_END pid=9434 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.394000 audit[9434]: CRED_DISP pid=9434 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:02.395977 systemd[1]: sshd@44-145.40.90.149:22-147.75.109.163:38260.service: Deactivated successfully. Apr 12 22:01:02.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.149:22-147.75.109.163:38260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:02.396421 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 22:01:02.396824 systemd-logind[1462]: Session 24 logged out. Waiting for processes to exit. Apr 12 22:01:02.397179 systemd-logind[1462]: Removed session 24. Apr 12 22:01:07.399769 systemd[1]: Started sshd@45-145.40.90.149:22-147.75.109.163:46222.service. Apr 12 22:01:07.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.149:22-147.75.109.163:46222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:07.426593 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 22:01:07.426643 kernel: audit: type=1130 audit(1712959267.398:1822): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.149:22-147.75.109.163:46222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:07.547000 audit[9478]: USER_ACCT pid=9478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.549113 sshd[9478]: Accepted publickey for core from 147.75.109.163 port 46222 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:01:07.551646 sshd[9478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:01:07.557590 systemd-logind[1462]: New session 25 of user core. Apr 12 22:01:07.559315 systemd[1]: Started session-25.scope. Apr 12 22:01:07.549000 audit[9478]: CRED_ACQ pid=9478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.642749 sshd[9478]: pam_unix(sshd:session): session closed for user core Apr 12 22:01:07.644191 systemd[1]: sshd@45-145.40.90.149:22-147.75.109.163:46222.service: Deactivated successfully. Apr 12 22:01:07.644634 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 22:01:07.644997 systemd-logind[1462]: Session 25 logged out. Waiting for processes to exit. Apr 12 22:01:07.645536 systemd-logind[1462]: Removed session 25. Apr 12 22:01:07.731882 kernel: audit: type=1101 audit(1712959267.547:1823): pid=9478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.731921 kernel: audit: type=1103 audit(1712959267.549:1824): pid=9478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.731938 kernel: audit: type=1006 audit(1712959267.549:1825): pid=9478 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 22:01:07.549000 audit[9478]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8609c330 a2=3 a3=0 items=0 ppid=1 pid=9478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:07.883718 kernel: audit: type=1300 audit(1712959267.549:1825): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8609c330 a2=3 a3=0 items=0 ppid=1 pid=9478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:07.883752 kernel: audit: type=1327 audit(1712959267.549:1825): proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:07.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:07.565000 audit[9478]: USER_START pid=9478 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:08.009743 kernel: audit: type=1105 audit(1712959267.565:1826): pid=9478 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:08.009779 kernel: audit: type=1103 audit(1712959267.566:1827): pid=9480 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.566000 audit[9480]: CRED_ACQ pid=9480 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:08.099150 kernel: audit: type=1106 audit(1712959267.642:1828): pid=9478 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.642000 audit[9478]: USER_END pid=9478 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:08.195417 kernel: audit: type=1104 audit(1712959267.642:1829): pid=9478 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.642000 audit[9478]: CRED_DISP pid=9478 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:07.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.149:22-147.75.109.163:46222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:08.037000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.037000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001597350 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:01:08.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:01:08.037000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.037000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001047700 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:01:08.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:01:08.101000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.101000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.101000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0079fd590 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:01:08.101000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00932ad60 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:01:08.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:01:08.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:01:08.101000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.101000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006b94cc0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:01:08.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:01:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524895 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524897 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007e61f80 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:01:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:01:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0079fd620 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:01:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:01:08.102000 audit[2384]: AVC avc: denied { watch } for pid=2384 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:08.102000 audit[2384]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c006e15ea0 a2=fc6 a3=0 items=0 ppid=2223 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c543,c698 key=(null) Apr 12 22:01:08.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E39302E313439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 22:01:10.921000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:10.921000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019a4960 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:01:10.921000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:01:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ce07c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:01:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a2f7e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:01:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:01:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:01:10.922000 audit[2386]: AVC avc: denied { watch } for pid=2386 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 22:01:10.922000 audit[2386]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001ba4300 a2=fc6 a3=0 items=0 ppid=2240 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c634 key=(null) Apr 12 22:01:10.922000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 22:01:12.654437 systemd[1]: Started sshd@46-145.40.90.149:22-147.75.109.163:46236.service. Apr 12 22:01:12.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.149:22-147.75.109.163:46236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:12.682187 kernel: kauditd_printk_skb: 37 callbacks suppressed Apr 12 22:01:12.682234 kernel: audit: type=1130 audit(1712959272.653:1843): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.149:22-147.75.109.163:46236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:12.804000 audit[9545]: USER_ACCT pid=9545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.805359 sshd[9545]: Accepted publickey for core from 147.75.109.163 port 46236 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:01:12.806661 sshd[9545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:01:12.809133 systemd-logind[1462]: New session 26 of user core. Apr 12 22:01:12.809633 systemd[1]: Started session-26.scope. Apr 12 22:01:12.888099 sshd[9545]: pam_unix(sshd:session): session closed for user core Apr 12 22:01:12.889550 systemd[1]: sshd@46-145.40.90.149:22-147.75.109.163:46236.service: Deactivated successfully. Apr 12 22:01:12.889992 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 22:01:12.890338 systemd-logind[1462]: Session 26 logged out. Waiting for processes to exit. Apr 12 22:01:12.890801 systemd-logind[1462]: Removed session 26. Apr 12 22:01:12.805000 audit[9545]: CRED_ACQ pid=9545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.898325 kernel: audit: type=1101 audit(1712959272.804:1844): pid=9545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.898362 kernel: audit: type=1103 audit(1712959272.805:1845): pid=9545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:13.046408 kernel: audit: type=1006 audit(1712959272.805:1846): pid=9545 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 22:01:13.046452 kernel: audit: type=1300 audit(1712959272.805:1846): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec9809350 a2=3 a3=0 items=0 ppid=1 pid=9545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:12.805000 audit[9545]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec9809350 a2=3 a3=0 items=0 ppid=1 pid=9545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:13.138326 kernel: audit: type=1327 audit(1712959272.805:1846): proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:12.805000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:13.168828 kernel: audit: type=1105 audit(1712959272.810:1847): pid=9545 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.810000 audit[9545]: USER_START pid=9545 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:13.263235 kernel: audit: type=1103 audit(1712959272.811:1848): pid=9547 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.811000 audit[9547]: CRED_ACQ pid=9547 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:13.352483 kernel: audit: type=1106 audit(1712959272.887:1849): pid=9545 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.887000 audit[9545]: USER_END pid=9545 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.887000 audit[9545]: CRED_DISP pid=9545 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:13.448233 kernel: audit: type=1104 audit(1712959272.887:1850): pid=9545 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:12.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.149:22-147.75.109.163:46236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:14.827000 audit[5598]: AVC avc: denied { watch } for pid=5598 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3695448349/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c93,c617 tclass=file permissive=0 Apr 12 22:01:14.827000 audit[5598]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a80060 a2=fc6 a3=0 items=0 ppid=5115 pid=5598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c617 key=(null) Apr 12 22:01:14.827000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:01:15.046000 audit[5641]: AVC avc: denied { watch } for pid=5641 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_21_47_10.3146910842/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c343,c428 tclass=file permissive=0 Apr 12 22:01:15.046000 audit[5641]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f0e080 a2=fc6 a3=0 items=0 ppid=5171 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c343,c428 key=(null) Apr 12 22:01:15.046000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 22:01:17.900430 systemd[1]: Started sshd@47-145.40.90.149:22-147.75.109.163:57064.service. Apr 12 22:01:17.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.149:22-147.75.109.163:57064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:17.928310 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 22:01:17.928378 kernel: audit: type=1130 audit(1712959277.899:1854): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.149:22-147.75.109.163:57064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:01:18.050000 audit[9595]: USER_ACCT pid=9595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.051993 sshd[9595]: Accepted publickey for core from 147.75.109.163 port 57064 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:01:18.055548 sshd[9595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:01:18.066519 systemd-logind[1462]: New session 27 of user core. Apr 12 22:01:18.069914 systemd[1]: Started session-27.scope. Apr 12 22:01:18.053000 audit[9595]: CRED_ACQ pid=9595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.159912 sshd[9595]: pam_unix(sshd:session): session closed for user core Apr 12 22:01:18.161418 systemd[1]: sshd@47-145.40.90.149:22-147.75.109.163:57064.service: Deactivated successfully. Apr 12 22:01:18.161851 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 22:01:18.162155 systemd-logind[1462]: Session 27 logged out. Waiting for processes to exit. Apr 12 22:01:18.162732 systemd-logind[1462]: Removed session 27. Apr 12 22:01:18.235172 kernel: audit: type=1101 audit(1712959278.050:1855): pid=9595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.235208 kernel: audit: type=1103 audit(1712959278.053:1856): pid=9595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.235232 kernel: audit: type=1006 audit(1712959278.053:1857): pid=9595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 22:01:18.293728 kernel: audit: type=1300 audit(1712959278.053:1857): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc682f150 a2=3 a3=0 items=0 ppid=1 pid=9595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:18.053000 audit[9595]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc682f150 a2=3 a3=0 items=0 ppid=1 pid=9595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:18.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:18.416159 kernel: audit: type=1327 audit(1712959278.053:1857): proctitle=737368643A20636F7265205B707269765D Apr 12 22:01:18.416199 kernel: audit: type=1105 audit(1712959278.078:1858): pid=9595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.078000 audit[9595]: USER_START pid=9595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.510536 kernel: audit: type=1103 audit(1712959278.080:1859): pid=9597 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.080000 audit[9597]: CRED_ACQ pid=9597 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.599774 kernel: audit: type=1106 audit(1712959278.159:1860): pid=9595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.159000 audit[9595]: USER_END pid=9595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.695204 kernel: audit: type=1104 audit(1712959278.159:1861): pid=9595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.159000 audit[9595]: CRED_DISP pid=9595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:01:18.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.149:22-147.75.109.163:57064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'