Apr 12 20:48:31.703050 kernel: Booting Linux on physical CPU 0x0000120000 [0x413fd0c1] Apr 12 20:48:31.703070 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 20:48:31.703078 kernel: efi: EFI v2.70 by American Megatrends Apr 12 20:48:31.703084 kernel: efi: ACPI 2.0=0xebfa0000 SMBIOS 3.0=0xf0a1ff98 ESRT=0xea385818 RNG=0xebe30018 MEMRESERVE=0xe462af98 Apr 12 20:48:31.703089 kernel: random: crng init done Apr 12 20:48:31.703094 kernel: esrt: Reserving ESRT space from 0x00000000ea385818 to 0x00000000ea385878. Apr 12 20:48:31.703101 kernel: ACPI: Early table checksum verification disabled Apr 12 20:48:31.703106 kernel: ACPI: RSDP 0x00000000EBFA0000 000024 (v02 Ampere) Apr 12 20:48:31.703113 kernel: ACPI: XSDT 0x00000000EBF90000 0000A4 (v01 Ampere Altra 00000000 AMI 01000013) Apr 12 20:48:31.703118 kernel: ACPI: FACP 0x00000000EBF70000 000114 (v06 Ampere Altra 00000000 INTL 20190509) Apr 12 20:48:31.703123 kernel: ACPI: DSDT 0x00000000EBF10000 019B57 (v02 Ampere Jade 00000001 INTL 20200717) Apr 12 20:48:31.703128 kernel: ACPI: DBG2 0x00000000EBF80000 00005C (v00 Ampere Altra 00000000 INTL 20190509) Apr 12 20:48:31.703134 kernel: ACPI: GTDT 0x00000000EBF60000 000110 (v03 Ampere Altra 00000000 INTL 20190509) Apr 12 20:48:31.703139 kernel: ACPI: SSDT 0x00000000EBF50000 00002D (v02 Ampere Altra 00000001 INTL 20190509) Apr 12 20:48:31.703147 kernel: ACPI: FIDT 0x00000000EBF00000 00009C (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 20:48:31.703152 kernel: ACPI: SPCR 0x00000000EBEF0000 000050 (v02 ALASKA A M I 01072009 AMI 0005000F) Apr 12 20:48:31.703158 kernel: ACPI: BGRT 0x00000000EBEE0000 000038 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 20:48:31.703164 kernel: ACPI: MCFG 0x00000000EBED0000 0000AC (v01 Ampere Altra 00000001 AMP. 01000013) Apr 12 20:48:31.703170 kernel: ACPI: IORT 0x00000000EBEC0000 000610 (v00 Ampere Altra 00000000 AMP. 01000013) Apr 12 20:48:31.703176 kernel: ACPI: PPTT 0x00000000EBEA0000 006E60 (v02 Ampere Altra 00000000 AMP. 01000013) Apr 12 20:48:31.703181 kernel: ACPI: SLIT 0x00000000EBE90000 00002D (v01 Ampere Altra 00000000 AMP. 01000013) Apr 12 20:48:31.703187 kernel: ACPI: SRAT 0x00000000EBE80000 0006D0 (v03 Ampere Altra 00000000 AMP. 01000013) Apr 12 20:48:31.703192 kernel: ACPI: APIC 0x00000000EBEB0000 0019F4 (v05 Ampere Altra 00000003 AMI 01000013) Apr 12 20:48:31.703199 kernel: ACPI: PCCT 0x00000000EBE60000 000576 (v02 Ampere Altra 00000003 AMP. 01000013) Apr 12 20:48:31.703205 kernel: ACPI: WSMT 0x00000000EBE50000 000028 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 20:48:31.703210 kernel: ACPI: FPDT 0x00000000EBE40000 000044 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 12 20:48:31.703216 kernel: ACPI: SPCR: console: pl011,mmio32,0x100002600000,115200 Apr 12 20:48:31.703222 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x88300000-0x883fffff] Apr 12 20:48:31.703227 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x90000000-0xffffffff] Apr 12 20:48:31.703233 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0x8007fffffff] Apr 12 20:48:31.703238 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80100000000-0x83fffffffff] Apr 12 20:48:31.703244 kernel: NUMA: NODE_DATA [mem 0x83fdffd0900-0x83fdffd5fff] Apr 12 20:48:31.703250 kernel: Zone ranges: Apr 12 20:48:31.703255 kernel: DMA [mem 0x0000000088300000-0x00000000ffffffff] Apr 12 20:48:31.703261 kernel: DMA32 empty Apr 12 20:48:31.703267 kernel: Normal [mem 0x0000000100000000-0x0000083fffffffff] Apr 12 20:48:31.703273 kernel: Movable zone start for each node Apr 12 20:48:31.703279 kernel: Early memory node ranges Apr 12 20:48:31.703284 kernel: node 0: [mem 0x0000000088300000-0x00000000883fffff] Apr 12 20:48:31.703290 kernel: node 0: [mem 0x0000000090000000-0x0000000091ffffff] Apr 12 20:48:31.703298 kernel: node 0: [mem 0x0000000092000000-0x0000000093ffffff] Apr 12 20:48:31.703304 kernel: node 0: [mem 0x0000000094000000-0x00000000eb956fff] Apr 12 20:48:31.703312 kernel: node 0: [mem 0x00000000eb957000-0x00000000ebdcdfff] Apr 12 20:48:31.703318 kernel: node 0: [mem 0x00000000ebdce000-0x00000000ebdcefff] Apr 12 20:48:31.703323 kernel: node 0: [mem 0x00000000ebdcf000-0x00000000ebdecfff] Apr 12 20:48:31.703329 kernel: node 0: [mem 0x00000000ebded000-0x00000000ebdedfff] Apr 12 20:48:31.703335 kernel: node 0: [mem 0x00000000ebdee000-0x00000000ebdeffff] Apr 12 20:48:31.703341 kernel: node 0: [mem 0x00000000ebdf0000-0x00000000ec00ffff] Apr 12 20:48:31.703347 kernel: node 0: [mem 0x00000000ec010000-0x00000000ec01ffff] Apr 12 20:48:31.703353 kernel: node 0: [mem 0x00000000ec020000-0x00000000ee54ffff] Apr 12 20:48:31.703359 kernel: node 0: [mem 0x00000000ee550000-0x00000000f765ffff] Apr 12 20:48:31.703366 kernel: node 0: [mem 0x00000000f7660000-0x00000000f784ffff] Apr 12 20:48:31.703372 kernel: node 0: [mem 0x00000000f7850000-0x00000000f7fdffff] Apr 12 20:48:31.703378 kernel: node 0: [mem 0x00000000f7fe0000-0x00000000ffc8efff] Apr 12 20:48:31.703384 kernel: node 0: [mem 0x00000000ffc8f000-0x00000000ffc8ffff] Apr 12 20:48:31.703390 kernel: node 0: [mem 0x00000000ffc90000-0x00000000ffffffff] Apr 12 20:48:31.703396 kernel: node 0: [mem 0x0000080000000000-0x000008007fffffff] Apr 12 20:48:31.703402 kernel: node 0: [mem 0x0000080100000000-0x0000083fffffffff] Apr 12 20:48:31.703408 kernel: Initmem setup node 0 [mem 0x0000000088300000-0x0000083fffffffff] Apr 12 20:48:31.703414 kernel: On node 0, zone DMA: 768 pages in unavailable ranges Apr 12 20:48:31.703420 kernel: On node 0, zone DMA: 31744 pages in unavailable ranges Apr 12 20:48:31.703425 kernel: psci: probing for conduit method from ACPI. Apr 12 20:48:31.703431 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 20:48:31.703439 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 20:48:31.703445 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 20:48:31.703451 kernel: psci: SMC Calling Convention v1.2 Apr 12 20:48:31.703460 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node 0 Apr 12 20:48:31.703466 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100 -> Node 0 Apr 12 20:48:31.703472 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10000 -> Node 0 Apr 12 20:48:31.703478 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10100 -> Node 0 Apr 12 20:48:31.703484 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20000 -> Node 0 Apr 12 20:48:31.703490 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20100 -> Node 0 Apr 12 20:48:31.703496 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30000 -> Node 0 Apr 12 20:48:31.703502 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30100 -> Node 0 Apr 12 20:48:31.703508 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40000 -> Node 0 Apr 12 20:48:31.703516 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40100 -> Node 0 Apr 12 20:48:31.703522 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50000 -> Node 0 Apr 12 20:48:31.703528 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50100 -> Node 0 Apr 12 20:48:31.703534 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60000 -> Node 0 Apr 12 20:48:31.703539 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60100 -> Node 0 Apr 12 20:48:31.703545 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70000 -> Node 0 Apr 12 20:48:31.703551 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70100 -> Node 0 Apr 12 20:48:31.703557 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80000 -> Node 0 Apr 12 20:48:31.703563 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80100 -> Node 0 Apr 12 20:48:31.703569 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90000 -> Node 0 Apr 12 20:48:31.703575 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90100 -> Node 0 Apr 12 20:48:31.703581 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0000 -> Node 0 Apr 12 20:48:31.703588 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0100 -> Node 0 Apr 12 20:48:31.703594 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0000 -> Node 0 Apr 12 20:48:31.703600 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0100 -> Node 0 Apr 12 20:48:31.703605 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0000 -> Node 0 Apr 12 20:48:31.703611 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0100 -> Node 0 Apr 12 20:48:31.703617 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0000 -> Node 0 Apr 12 20:48:31.703623 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0100 -> Node 0 Apr 12 20:48:31.703629 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0000 -> Node 0 Apr 12 20:48:31.703635 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0100 -> Node 0 Apr 12 20:48:31.703641 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0000 -> Node 0 Apr 12 20:48:31.703647 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0100 -> Node 0 Apr 12 20:48:31.703654 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100000 -> Node 0 Apr 12 20:48:31.703660 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100100 -> Node 0 Apr 12 20:48:31.703666 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110000 -> Node 0 Apr 12 20:48:31.703672 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110100 -> Node 0 Apr 12 20:48:31.703678 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120000 -> Node 0 Apr 12 20:48:31.703683 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120100 -> Node 0 Apr 12 20:48:31.703689 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130000 -> Node 0 Apr 12 20:48:31.703695 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130100 -> Node 0 Apr 12 20:48:31.703701 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140000 -> Node 0 Apr 12 20:48:31.703707 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140100 -> Node 0 Apr 12 20:48:31.703713 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150000 -> Node 0 Apr 12 20:48:31.703719 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150100 -> Node 0 Apr 12 20:48:31.703726 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160000 -> Node 0 Apr 12 20:48:31.703732 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160100 -> Node 0 Apr 12 20:48:31.703738 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170000 -> Node 0 Apr 12 20:48:31.703744 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170100 -> Node 0 Apr 12 20:48:31.703749 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180000 -> Node 0 Apr 12 20:48:31.703755 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180100 -> Node 0 Apr 12 20:48:31.703761 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190000 -> Node 0 Apr 12 20:48:31.703767 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190100 -> Node 0 Apr 12 20:48:31.703778 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0000 -> Node 0 Apr 12 20:48:31.703785 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0100 -> Node 0 Apr 12 20:48:31.703792 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0000 -> Node 0 Apr 12 20:48:31.703798 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0100 -> Node 0 Apr 12 20:48:31.703805 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0000 -> Node 0 Apr 12 20:48:31.703811 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0100 -> Node 0 Apr 12 20:48:31.703817 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0000 -> Node 0 Apr 12 20:48:31.703824 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0100 -> Node 0 Apr 12 20:48:31.703831 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0000 -> Node 0 Apr 12 20:48:31.703837 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0100 -> Node 0 Apr 12 20:48:31.703844 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0000 -> Node 0 Apr 12 20:48:31.703850 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0100 -> Node 0 Apr 12 20:48:31.703856 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200000 -> Node 0 Apr 12 20:48:31.703863 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200100 -> Node 0 Apr 12 20:48:31.703869 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210000 -> Node 0 Apr 12 20:48:31.703875 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210100 -> Node 0 Apr 12 20:48:31.703881 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220000 -> Node 0 Apr 12 20:48:31.703888 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220100 -> Node 0 Apr 12 20:48:31.703894 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230000 -> Node 0 Apr 12 20:48:31.703901 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230100 -> Node 0 Apr 12 20:48:31.703908 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240000 -> Node 0 Apr 12 20:48:31.703914 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240100 -> Node 0 Apr 12 20:48:31.703920 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250000 -> Node 0 Apr 12 20:48:31.703926 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250100 -> Node 0 Apr 12 20:48:31.703933 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260000 -> Node 0 Apr 12 20:48:31.703939 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260100 -> Node 0 Apr 12 20:48:31.703945 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270000 -> Node 0 Apr 12 20:48:31.703952 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270100 -> Node 0 Apr 12 20:48:31.703958 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 20:48:31.703964 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 20:48:31.703971 kernel: pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07 Apr 12 20:48:31.703979 kernel: pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15 Apr 12 20:48:31.703985 kernel: pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23 Apr 12 20:48:31.703991 kernel: pcpu-alloc: [0] 24 [0] 25 [0] 26 [0] 27 [0] 28 [0] 29 [0] 30 [0] 31 Apr 12 20:48:31.703998 kernel: pcpu-alloc: [0] 32 [0] 33 [0] 34 [0] 35 [0] 36 [0] 37 [0] 38 [0] 39 Apr 12 20:48:31.704004 kernel: pcpu-alloc: [0] 40 [0] 41 [0] 42 [0] 43 [0] 44 [0] 45 [0] 46 [0] 47 Apr 12 20:48:31.704010 kernel: pcpu-alloc: [0] 48 [0] 49 [0] 50 [0] 51 [0] 52 [0] 53 [0] 54 [0] 55 Apr 12 20:48:31.704017 kernel: pcpu-alloc: [0] 56 [0] 57 [0] 58 [0] 59 [0] 60 [0] 61 [0] 62 [0] 63 Apr 12 20:48:31.704023 kernel: pcpu-alloc: [0] 64 [0] 65 [0] 66 [0] 67 [0] 68 [0] 69 [0] 70 [0] 71 Apr 12 20:48:31.704029 kernel: pcpu-alloc: [0] 72 [0] 73 [0] 74 [0] 75 [0] 76 [0] 77 [0] 78 [0] 79 Apr 12 20:48:31.704035 kernel: Detected PIPT I-cache on CPU0 Apr 12 20:48:31.704041 kernel: CPU features: detected: GIC system register CPU interface Apr 12 20:48:31.704049 kernel: CPU features: detected: Virtualization Host Extensions Apr 12 20:48:31.704055 kernel: CPU features: detected: Hardware dirty bit management Apr 12 20:48:31.704062 kernel: CPU features: detected: Spectre-v4 Apr 12 20:48:31.704068 kernel: CPU features: detected: Spectre-BHB Apr 12 20:48:31.704074 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 20:48:31.704081 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 20:48:31.704087 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 20:48:31.704093 kernel: alternatives: patching kernel code Apr 12 20:48:31.704100 kernel: Built 1 zonelists, mobility grouping on. Total pages: 65996028 Apr 12 20:48:31.704106 kernel: Policy zone: Normal Apr 12 20:48:31.704114 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 20:48:31.704121 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 20:48:31.704128 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Apr 12 20:48:31.704134 kernel: printk: log_buf_len total cpu_extra contributions: 323584 bytes Apr 12 20:48:31.704140 kernel: printk: log_buf_len min size: 262144 bytes Apr 12 20:48:31.704146 kernel: printk: log_buf_len: 1048576 bytes Apr 12 20:48:31.704153 kernel: printk: early log buf free: 249888(95%) Apr 12 20:48:31.704159 kernel: Dentry cache hash table entries: 16777216 (order: 15, 134217728 bytes, linear) Apr 12 20:48:31.704166 kernel: Inode-cache hash table entries: 8388608 (order: 14, 67108864 bytes, linear) Apr 12 20:48:31.704172 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 20:48:31.704178 kernel: software IO TLB: mapped [mem 0x00000000fbc8f000-0x00000000ffc8f000] (64MB) Apr 12 20:48:31.704185 kernel: Memory: 262927136K/268174336K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 5247200K reserved, 0K cma-reserved) Apr 12 20:48:31.704193 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=80, Nodes=1 Apr 12 20:48:31.704199 kernel: trace event string verifier disabled Apr 12 20:48:31.704206 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 20:48:31.704212 kernel: rcu: RCU event tracing is enabled. Apr 12 20:48:31.704219 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=80. Apr 12 20:48:31.704225 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 20:48:31.704232 kernel: Tracing variant of Tasks RCU enabled. Apr 12 20:48:31.704238 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 20:48:31.704245 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=80 Apr 12 20:48:31.704251 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 20:48:31.704258 kernel: GICv3: GIC: Using split EOI/Deactivate mode Apr 12 20:48:31.704265 kernel: GICv3: 672 SPIs implemented Apr 12 20:48:31.704271 kernel: GICv3: 0 Extended SPIs implemented Apr 12 20:48:31.704278 kernel: GICv3: Distributor has no Range Selector support Apr 12 20:48:31.704284 kernel: Root IRQ handler: gic_handle_irq Apr 12 20:48:31.704290 kernel: GICv3: 16 PPIs implemented Apr 12 20:48:31.704296 kernel: GICv3: CPU0: found redistributor 120000 region 0:0x00001001005c0000 Apr 12 20:48:31.704303 kernel: SRAT: PXM 0 -> ITS 0 -> Node 0 Apr 12 20:48:31.704309 kernel: SRAT: PXM 0 -> ITS 1 -> Node 0 Apr 12 20:48:31.704316 kernel: SRAT: PXM 0 -> ITS 2 -> Node 0 Apr 12 20:48:31.704322 kernel: SRAT: PXM 0 -> ITS 3 -> Node 0 Apr 12 20:48:31.704328 kernel: SRAT: PXM 0 -> ITS 4 -> Node 0 Apr 12 20:48:31.704334 kernel: SRAT: PXM 0 -> ITS 5 -> Node 0 Apr 12 20:48:31.704341 kernel: SRAT: PXM 0 -> ITS 6 -> Node 0 Apr 12 20:48:31.704348 kernel: SRAT: PXM 0 -> ITS 7 -> Node 0 Apr 12 20:48:31.704355 kernel: ITS [mem 0x100100040000-0x10010005ffff] Apr 12 20:48:31.704361 kernel: ITS@0x0000100100040000: allocated 8192 Devices @80000200000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704368 kernel: ITS@0x0000100100040000: allocated 32768 Interrupt Collections @80000210000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704374 kernel: ITS [mem 0x100100060000-0x10010007ffff] Apr 12 20:48:31.704381 kernel: ITS@0x0000100100060000: allocated 8192 Devices @80000230000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704387 kernel: ITS@0x0000100100060000: allocated 32768 Interrupt Collections @80000240000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704394 kernel: ITS [mem 0x100100080000-0x10010009ffff] Apr 12 20:48:31.704400 kernel: ITS@0x0000100100080000: allocated 8192 Devices @80000260000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704407 kernel: ITS@0x0000100100080000: allocated 32768 Interrupt Collections @80000270000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704413 kernel: ITS [mem 0x1001000a0000-0x1001000bffff] Apr 12 20:48:31.704421 kernel: ITS@0x00001001000a0000: allocated 8192 Devices @80000290000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704427 kernel: ITS@0x00001001000a0000: allocated 32768 Interrupt Collections @800002a0000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704434 kernel: ITS [mem 0x1001000c0000-0x1001000dffff] Apr 12 20:48:31.704440 kernel: ITS@0x00001001000c0000: allocated 8192 Devices @800002c0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704446 kernel: ITS@0x00001001000c0000: allocated 32768 Interrupt Collections @800002d0000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704453 kernel: ITS [mem 0x1001000e0000-0x1001000fffff] Apr 12 20:48:31.704461 kernel: ITS@0x00001001000e0000: allocated 8192 Devices @80000300000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704468 kernel: ITS@0x00001001000e0000: allocated 32768 Interrupt Collections @80000310000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704474 kernel: ITS [mem 0x100100100000-0x10010011ffff] Apr 12 20:48:31.704481 kernel: ITS@0x0000100100100000: allocated 8192 Devices @80000330000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704487 kernel: ITS@0x0000100100100000: allocated 32768 Interrupt Collections @80000340000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704495 kernel: ITS [mem 0x100100120000-0x10010013ffff] Apr 12 20:48:31.704501 kernel: ITS@0x0000100100120000: allocated 8192 Devices @80000360000 (indirect, esz 8, psz 64K, shr 1) Apr 12 20:48:31.704508 kernel: ITS@0x0000100100120000: allocated 32768 Interrupt Collections @80000370000 (flat, esz 2, psz 64K, shr 1) Apr 12 20:48:31.704514 kernel: GICv3: using LPI property table @0x0000080000380000 Apr 12 20:48:31.704521 kernel: GICv3: CPU0: using allocated LPI pending table @0x0000080000390000 Apr 12 20:48:31.704527 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704533 kernel: ACPI GTDT: found 1 memory-mapped timer block(s). Apr 12 20:48:31.704540 kernel: arch_timer: cp15 and mmio timer(s) running at 25.00MHz (phys/phys). Apr 12 20:48:31.704546 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 20:48:31.704553 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 20:48:31.704559 kernel: Console: colour dummy device 80x25 Apr 12 20:48:31.704567 kernel: printk: console [tty0] enabled Apr 12 20:48:31.704573 kernel: ACPI: Core revision 20210730 Apr 12 20:48:31.704580 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 20:48:31.704587 kernel: pid_max: default: 81920 minimum: 640 Apr 12 20:48:31.704593 kernel: LSM: Security Framework initializing Apr 12 20:48:31.704600 kernel: SELinux: Initializing. Apr 12 20:48:31.704606 kernel: Mount-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:48:31.704613 kernel: Mountpoint-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:48:31.704619 kernel: rcu: Hierarchical SRCU implementation. Apr 12 20:48:31.704627 kernel: Platform MSI: ITS@0x100100040000 domain created Apr 12 20:48:31.704634 kernel: Platform MSI: ITS@0x100100060000 domain created Apr 12 20:48:31.704640 kernel: Platform MSI: ITS@0x100100080000 domain created Apr 12 20:48:31.704647 kernel: Platform MSI: ITS@0x1001000a0000 domain created Apr 12 20:48:31.704653 kernel: Platform MSI: ITS@0x1001000c0000 domain created Apr 12 20:48:31.704660 kernel: Platform MSI: ITS@0x1001000e0000 domain created Apr 12 20:48:31.704666 kernel: Platform MSI: ITS@0x100100100000 domain created Apr 12 20:48:31.704673 kernel: Platform MSI: ITS@0x100100120000 domain created Apr 12 20:48:31.704679 kernel: PCI/MSI: ITS@0x100100040000 domain created Apr 12 20:48:31.704686 kernel: PCI/MSI: ITS@0x100100060000 domain created Apr 12 20:48:31.704693 kernel: PCI/MSI: ITS@0x100100080000 domain created Apr 12 20:48:31.704699 kernel: PCI/MSI: ITS@0x1001000a0000 domain created Apr 12 20:48:31.704706 kernel: PCI/MSI: ITS@0x1001000c0000 domain created Apr 12 20:48:31.704712 kernel: PCI/MSI: ITS@0x1001000e0000 domain created Apr 12 20:48:31.704719 kernel: PCI/MSI: ITS@0x100100100000 domain created Apr 12 20:48:31.704725 kernel: PCI/MSI: ITS@0x100100120000 domain created Apr 12 20:48:31.704732 kernel: Remapping and enabling EFI services. Apr 12 20:48:31.704738 kernel: smp: Bringing up secondary CPUs ... Apr 12 20:48:31.704744 kernel: Detected PIPT I-cache on CPU1 Apr 12 20:48:31.704752 kernel: GICv3: CPU1: found redistributor 1a0000 region 0:0x00001001007c0000 Apr 12 20:48:31.704759 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000800003a0000 Apr 12 20:48:31.704765 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704772 kernel: CPU1: Booted secondary processor 0x00001a0000 [0x413fd0c1] Apr 12 20:48:31.704778 kernel: Detected PIPT I-cache on CPU2 Apr 12 20:48:31.704785 kernel: GICv3: CPU2: found redistributor 140000 region 0:0x0000100100640000 Apr 12 20:48:31.704791 kernel: GICv3: CPU2: using allocated LPI pending table @0x00000800003b0000 Apr 12 20:48:31.704798 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704804 kernel: CPU2: Booted secondary processor 0x0000140000 [0x413fd0c1] Apr 12 20:48:31.704812 kernel: Detected PIPT I-cache on CPU3 Apr 12 20:48:31.704819 kernel: GICv3: CPU3: found redistributor 1c0000 region 0:0x0000100100840000 Apr 12 20:48:31.704825 kernel: GICv3: CPU3: using allocated LPI pending table @0x00000800003c0000 Apr 12 20:48:31.704832 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704838 kernel: CPU3: Booted secondary processor 0x00001c0000 [0x413fd0c1] Apr 12 20:48:31.704844 kernel: Detected PIPT I-cache on CPU4 Apr 12 20:48:31.704851 kernel: GICv3: CPU4: found redistributor 100000 region 0:0x0000100100540000 Apr 12 20:48:31.704857 kernel: GICv3: CPU4: using allocated LPI pending table @0x00000800003d0000 Apr 12 20:48:31.704864 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704870 kernel: CPU4: Booted secondary processor 0x0000100000 [0x413fd0c1] Apr 12 20:48:31.704878 kernel: Detected PIPT I-cache on CPU5 Apr 12 20:48:31.704884 kernel: GICv3: CPU5: found redistributor 180000 region 0:0x0000100100740000 Apr 12 20:48:31.704891 kernel: GICv3: CPU5: using allocated LPI pending table @0x00000800003e0000 Apr 12 20:48:31.704898 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704904 kernel: CPU5: Booted secondary processor 0x0000180000 [0x413fd0c1] Apr 12 20:48:31.704910 kernel: Detected PIPT I-cache on CPU6 Apr 12 20:48:31.704917 kernel: GICv3: CPU6: found redistributor 160000 region 0:0x00001001006c0000 Apr 12 20:48:31.704923 kernel: GICv3: CPU6: using allocated LPI pending table @0x00000800003f0000 Apr 12 20:48:31.704930 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704937 kernel: CPU6: Booted secondary processor 0x0000160000 [0x413fd0c1] Apr 12 20:48:31.704944 kernel: Detected PIPT I-cache on CPU7 Apr 12 20:48:31.704950 kernel: GICv3: CPU7: found redistributor 1e0000 region 0:0x00001001008c0000 Apr 12 20:48:31.704957 kernel: GICv3: CPU7: using allocated LPI pending table @0x0000080000800000 Apr 12 20:48:31.704963 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.704970 kernel: CPU7: Booted secondary processor 0x00001e0000 [0x413fd0c1] Apr 12 20:48:31.704976 kernel: Detected PIPT I-cache on CPU8 Apr 12 20:48:31.704983 kernel: GICv3: CPU8: found redistributor a0000 region 0:0x00001001003c0000 Apr 12 20:48:31.704989 kernel: GICv3: CPU8: using allocated LPI pending table @0x0000080000810000 Apr 12 20:48:31.704996 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705004 kernel: CPU8: Booted secondary processor 0x00000a0000 [0x413fd0c1] Apr 12 20:48:31.705010 kernel: Detected PIPT I-cache on CPU9 Apr 12 20:48:31.705017 kernel: GICv3: CPU9: found redistributor 220000 region 0:0x00001001009c0000 Apr 12 20:48:31.705023 kernel: GICv3: CPU9: using allocated LPI pending table @0x0000080000820000 Apr 12 20:48:31.705030 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705036 kernel: CPU9: Booted secondary processor 0x0000220000 [0x413fd0c1] Apr 12 20:48:31.705043 kernel: Detected PIPT I-cache on CPU10 Apr 12 20:48:31.705049 kernel: GICv3: CPU10: found redistributor c0000 region 0:0x0000100100440000 Apr 12 20:48:31.705056 kernel: GICv3: CPU10: using allocated LPI pending table @0x0000080000830000 Apr 12 20:48:31.705063 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705070 kernel: CPU10: Booted secondary processor 0x00000c0000 [0x413fd0c1] Apr 12 20:48:31.705077 kernel: Detected PIPT I-cache on CPU11 Apr 12 20:48:31.705083 kernel: GICv3: CPU11: found redistributor 240000 region 0:0x0000100100a40000 Apr 12 20:48:31.705090 kernel: GICv3: CPU11: using allocated LPI pending table @0x0000080000840000 Apr 12 20:48:31.705096 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705102 kernel: CPU11: Booted secondary processor 0x0000240000 [0x413fd0c1] Apr 12 20:48:31.705109 kernel: Detected PIPT I-cache on CPU12 Apr 12 20:48:31.705115 kernel: GICv3: CPU12: found redistributor 80000 region 0:0x0000100100340000 Apr 12 20:48:31.705122 kernel: GICv3: CPU12: using allocated LPI pending table @0x0000080000850000 Apr 12 20:48:31.705130 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705136 kernel: CPU12: Booted secondary processor 0x0000080000 [0x413fd0c1] Apr 12 20:48:31.705143 kernel: Detected PIPT I-cache on CPU13 Apr 12 20:48:31.705149 kernel: GICv3: CPU13: found redistributor 200000 region 0:0x0000100100940000 Apr 12 20:48:31.705156 kernel: GICv3: CPU13: using allocated LPI pending table @0x0000080000860000 Apr 12 20:48:31.705162 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705169 kernel: CPU13: Booted secondary processor 0x0000200000 [0x413fd0c1] Apr 12 20:48:31.705175 kernel: Detected PIPT I-cache on CPU14 Apr 12 20:48:31.705182 kernel: GICv3: CPU14: found redistributor e0000 region 0:0x00001001004c0000 Apr 12 20:48:31.705190 kernel: GICv3: CPU14: using allocated LPI pending table @0x0000080000870000 Apr 12 20:48:31.705196 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705202 kernel: CPU14: Booted secondary processor 0x00000e0000 [0x413fd0c1] Apr 12 20:48:31.705209 kernel: Detected PIPT I-cache on CPU15 Apr 12 20:48:31.705216 kernel: GICv3: CPU15: found redistributor 260000 region 0:0x0000100100ac0000 Apr 12 20:48:31.705222 kernel: GICv3: CPU15: using allocated LPI pending table @0x0000080000880000 Apr 12 20:48:31.705229 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705235 kernel: CPU15: Booted secondary processor 0x0000260000 [0x413fd0c1] Apr 12 20:48:31.705241 kernel: Detected PIPT I-cache on CPU16 Apr 12 20:48:31.705249 kernel: GICv3: CPU16: found redistributor 20000 region 0:0x00001001001c0000 Apr 12 20:48:31.705256 kernel: GICv3: CPU16: using allocated LPI pending table @0x0000080000890000 Apr 12 20:48:31.705262 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705269 kernel: CPU16: Booted secondary processor 0x0000020000 [0x413fd0c1] Apr 12 20:48:31.705275 kernel: Detected PIPT I-cache on CPU17 Apr 12 20:48:31.705282 kernel: GICv3: CPU17: found redistributor 40000 region 0:0x0000100100240000 Apr 12 20:48:31.705288 kernel: GICv3: CPU17: using allocated LPI pending table @0x00000800008a0000 Apr 12 20:48:31.705295 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705301 kernel: CPU17: Booted secondary processor 0x0000040000 [0x413fd0c1] Apr 12 20:48:31.705308 kernel: Detected PIPT I-cache on CPU18 Apr 12 20:48:31.705323 kernel: GICv3: CPU18: found redistributor 0 region 0:0x0000100100140000 Apr 12 20:48:31.705331 kernel: GICv3: CPU18: using allocated LPI pending table @0x00000800008b0000 Apr 12 20:48:31.705338 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705344 kernel: CPU18: Booted secondary processor 0x0000000000 [0x413fd0c1] Apr 12 20:48:31.705351 kernel: Detected PIPT I-cache on CPU19 Apr 12 20:48:31.705358 kernel: GICv3: CPU19: found redistributor 60000 region 0:0x00001001002c0000 Apr 12 20:48:31.705365 kernel: GICv3: CPU19: using allocated LPI pending table @0x00000800008c0000 Apr 12 20:48:31.705373 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705380 kernel: CPU19: Booted secondary processor 0x0000060000 [0x413fd0c1] Apr 12 20:48:31.705388 kernel: Detected PIPT I-cache on CPU20 Apr 12 20:48:31.705395 kernel: GICv3: CPU20: found redistributor 130000 region 0:0x0000100100600000 Apr 12 20:48:31.705401 kernel: GICv3: CPU20: using allocated LPI pending table @0x00000800008d0000 Apr 12 20:48:31.705408 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705416 kernel: CPU20: Booted secondary processor 0x0000130000 [0x413fd0c1] Apr 12 20:48:31.705423 kernel: Detected PIPT I-cache on CPU21 Apr 12 20:48:31.705430 kernel: GICv3: CPU21: found redistributor 1b0000 region 0:0x0000100100800000 Apr 12 20:48:31.705438 kernel: GICv3: CPU21: using allocated LPI pending table @0x00000800008e0000 Apr 12 20:48:31.705445 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705452 kernel: CPU21: Booted secondary processor 0x00001b0000 [0x413fd0c1] Apr 12 20:48:31.705460 kernel: Detected PIPT I-cache on CPU22 Apr 12 20:48:31.705467 kernel: GICv3: CPU22: found redistributor 150000 region 0:0x0000100100680000 Apr 12 20:48:31.705474 kernel: GICv3: CPU22: using allocated LPI pending table @0x00000800008f0000 Apr 12 20:48:31.705480 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705487 kernel: CPU22: Booted secondary processor 0x0000150000 [0x413fd0c1] Apr 12 20:48:31.705495 kernel: Detected PIPT I-cache on CPU23 Apr 12 20:48:31.705502 kernel: GICv3: CPU23: found redistributor 1d0000 region 0:0x0000100100880000 Apr 12 20:48:31.705509 kernel: GICv3: CPU23: using allocated LPI pending table @0x0000080000900000 Apr 12 20:48:31.705516 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705523 kernel: CPU23: Booted secondary processor 0x00001d0000 [0x413fd0c1] Apr 12 20:48:31.705529 kernel: Detected PIPT I-cache on CPU24 Apr 12 20:48:31.705536 kernel: GICv3: CPU24: found redistributor 110000 region 0:0x0000100100580000 Apr 12 20:48:31.705544 kernel: GICv3: CPU24: using allocated LPI pending table @0x0000080000910000 Apr 12 20:48:31.705550 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705557 kernel: CPU24: Booted secondary processor 0x0000110000 [0x413fd0c1] Apr 12 20:48:31.705565 kernel: Detected PIPT I-cache on CPU25 Apr 12 20:48:31.705572 kernel: GICv3: CPU25: found redistributor 190000 region 0:0x0000100100780000 Apr 12 20:48:31.705579 kernel: GICv3: CPU25: using allocated LPI pending table @0x0000080000920000 Apr 12 20:48:31.705586 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705593 kernel: CPU25: Booted secondary processor 0x0000190000 [0x413fd0c1] Apr 12 20:48:31.705599 kernel: Detected PIPT I-cache on CPU26 Apr 12 20:48:31.705606 kernel: GICv3: CPU26: found redistributor 170000 region 0:0x0000100100700000 Apr 12 20:48:31.705613 kernel: GICv3: CPU26: using allocated LPI pending table @0x0000080000930000 Apr 12 20:48:31.705620 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705628 kernel: CPU26: Booted secondary processor 0x0000170000 [0x413fd0c1] Apr 12 20:48:31.705635 kernel: Detected PIPT I-cache on CPU27 Apr 12 20:48:31.705642 kernel: GICv3: CPU27: found redistributor 1f0000 region 0:0x0000100100900000 Apr 12 20:48:31.705648 kernel: GICv3: CPU27: using allocated LPI pending table @0x0000080000940000 Apr 12 20:48:31.705655 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705662 kernel: CPU27: Booted secondary processor 0x00001f0000 [0x413fd0c1] Apr 12 20:48:31.705669 kernel: Detected PIPT I-cache on CPU28 Apr 12 20:48:31.705676 kernel: GICv3: CPU28: found redistributor b0000 region 0:0x0000100100400000 Apr 12 20:48:31.705683 kernel: GICv3: CPU28: using allocated LPI pending table @0x0000080000950000 Apr 12 20:48:31.705689 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705697 kernel: CPU28: Booted secondary processor 0x00000b0000 [0x413fd0c1] Apr 12 20:48:31.705704 kernel: Detected PIPT I-cache on CPU29 Apr 12 20:48:31.705711 kernel: GICv3: CPU29: found redistributor 230000 region 0:0x0000100100a00000 Apr 12 20:48:31.705718 kernel: GICv3: CPU29: using allocated LPI pending table @0x0000080000960000 Apr 12 20:48:31.705725 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705731 kernel: CPU29: Booted secondary processor 0x0000230000 [0x413fd0c1] Apr 12 20:48:31.705738 kernel: Detected PIPT I-cache on CPU30 Apr 12 20:48:31.705745 kernel: GICv3: CPU30: found redistributor d0000 region 0:0x0000100100480000 Apr 12 20:48:31.705752 kernel: GICv3: CPU30: using allocated LPI pending table @0x0000080000970000 Apr 12 20:48:31.705760 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705767 kernel: CPU30: Booted secondary processor 0x00000d0000 [0x413fd0c1] Apr 12 20:48:31.705773 kernel: Detected PIPT I-cache on CPU31 Apr 12 20:48:31.705780 kernel: GICv3: CPU31: found redistributor 250000 region 0:0x0000100100a80000 Apr 12 20:48:31.705787 kernel: GICv3: CPU31: using allocated LPI pending table @0x0000080000980000 Apr 12 20:48:31.705794 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705801 kernel: CPU31: Booted secondary processor 0x0000250000 [0x413fd0c1] Apr 12 20:48:31.705807 kernel: Detected PIPT I-cache on CPU32 Apr 12 20:48:31.705814 kernel: GICv3: CPU32: found redistributor 90000 region 0:0x0000100100380000 Apr 12 20:48:31.705821 kernel: GICv3: CPU32: using allocated LPI pending table @0x0000080000990000 Apr 12 20:48:31.705829 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705836 kernel: CPU32: Booted secondary processor 0x0000090000 [0x413fd0c1] Apr 12 20:48:31.705843 kernel: Detected PIPT I-cache on CPU33 Apr 12 20:48:31.705849 kernel: GICv3: CPU33: found redistributor 210000 region 0:0x0000100100980000 Apr 12 20:48:31.705856 kernel: GICv3: CPU33: using allocated LPI pending table @0x00000800009a0000 Apr 12 20:48:31.705863 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705870 kernel: CPU33: Booted secondary processor 0x0000210000 [0x413fd0c1] Apr 12 20:48:31.705877 kernel: Detected PIPT I-cache on CPU34 Apr 12 20:48:31.705885 kernel: GICv3: CPU34: found redistributor f0000 region 0:0x0000100100500000 Apr 12 20:48:31.705893 kernel: GICv3: CPU34: using allocated LPI pending table @0x00000800009b0000 Apr 12 20:48:31.705900 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705906 kernel: CPU34: Booted secondary processor 0x00000f0000 [0x413fd0c1] Apr 12 20:48:31.705913 kernel: Detected PIPT I-cache on CPU35 Apr 12 20:48:31.705920 kernel: GICv3: CPU35: found redistributor 270000 region 0:0x0000100100b00000 Apr 12 20:48:31.705927 kernel: GICv3: CPU35: using allocated LPI pending table @0x00000800009c0000 Apr 12 20:48:31.705934 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705940 kernel: CPU35: Booted secondary processor 0x0000270000 [0x413fd0c1] Apr 12 20:48:31.705947 kernel: Detected PIPT I-cache on CPU36 Apr 12 20:48:31.705955 kernel: GICv3: CPU36: found redistributor 30000 region 0:0x0000100100200000 Apr 12 20:48:31.705962 kernel: GICv3: CPU36: using allocated LPI pending table @0x00000800009d0000 Apr 12 20:48:31.705969 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.705976 kernel: CPU36: Booted secondary processor 0x0000030000 [0x413fd0c1] Apr 12 20:48:31.705982 kernel: Detected PIPT I-cache on CPU37 Apr 12 20:48:31.705989 kernel: GICv3: CPU37: found redistributor 50000 region 0:0x0000100100280000 Apr 12 20:48:31.705996 kernel: GICv3: CPU37: using allocated LPI pending table @0x00000800009e0000 Apr 12 20:48:31.706003 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706010 kernel: CPU37: Booted secondary processor 0x0000050000 [0x413fd0c1] Apr 12 20:48:31.706016 kernel: Detected PIPT I-cache on CPU38 Apr 12 20:48:31.706024 kernel: GICv3: CPU38: found redistributor 10000 region 0:0x0000100100180000 Apr 12 20:48:31.706031 kernel: GICv3: CPU38: using allocated LPI pending table @0x00000800009f0000 Apr 12 20:48:31.706038 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706045 kernel: CPU38: Booted secondary processor 0x0000010000 [0x413fd0c1] Apr 12 20:48:31.706051 kernel: Detected PIPT I-cache on CPU39 Apr 12 20:48:31.706058 kernel: GICv3: CPU39: found redistributor 70000 region 0:0x0000100100300000 Apr 12 20:48:31.706065 kernel: GICv3: CPU39: using allocated LPI pending table @0x0000080000a00000 Apr 12 20:48:31.706072 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706079 kernel: CPU39: Booted secondary processor 0x0000070000 [0x413fd0c1] Apr 12 20:48:31.706087 kernel: Detected PIPT I-cache on CPU40 Apr 12 20:48:31.706094 kernel: GICv3: CPU40: found redistributor 120100 region 0:0x00001001005e0000 Apr 12 20:48:31.706101 kernel: GICv3: CPU40: using allocated LPI pending table @0x0000080000a10000 Apr 12 20:48:31.706108 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706115 kernel: CPU40: Booted secondary processor 0x0000120100 [0x413fd0c1] Apr 12 20:48:31.706121 kernel: Detected PIPT I-cache on CPU41 Apr 12 20:48:31.706128 kernel: GICv3: CPU41: found redistributor 1a0100 region 0:0x00001001007e0000 Apr 12 20:48:31.706135 kernel: GICv3: CPU41: using allocated LPI pending table @0x0000080000a20000 Apr 12 20:48:31.706143 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706150 kernel: CPU41: Booted secondary processor 0x00001a0100 [0x413fd0c1] Apr 12 20:48:31.706156 kernel: Detected PIPT I-cache on CPU42 Apr 12 20:48:31.706163 kernel: GICv3: CPU42: found redistributor 140100 region 0:0x0000100100660000 Apr 12 20:48:31.706170 kernel: GICv3: CPU42: using allocated LPI pending table @0x0000080000a30000 Apr 12 20:48:31.706177 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706184 kernel: CPU42: Booted secondary processor 0x0000140100 [0x413fd0c1] Apr 12 20:48:31.706190 kernel: Detected PIPT I-cache on CPU43 Apr 12 20:48:31.706197 kernel: GICv3: CPU43: found redistributor 1c0100 region 0:0x0000100100860000 Apr 12 20:48:31.706204 kernel: GICv3: CPU43: using allocated LPI pending table @0x0000080000a40000 Apr 12 20:48:31.706212 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706219 kernel: CPU43: Booted secondary processor 0x00001c0100 [0x413fd0c1] Apr 12 20:48:31.706226 kernel: Detected PIPT I-cache on CPU44 Apr 12 20:48:31.706233 kernel: GICv3: CPU44: found redistributor 100100 region 0:0x0000100100560000 Apr 12 20:48:31.706240 kernel: GICv3: CPU44: using allocated LPI pending table @0x0000080000a50000 Apr 12 20:48:31.706246 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706253 kernel: CPU44: Booted secondary processor 0x0000100100 [0x413fd0c1] Apr 12 20:48:31.706260 kernel: Detected PIPT I-cache on CPU45 Apr 12 20:48:31.706267 kernel: GICv3: CPU45: found redistributor 180100 region 0:0x0000100100760000 Apr 12 20:48:31.706275 kernel: GICv3: CPU45: using allocated LPI pending table @0x0000080000a60000 Apr 12 20:48:31.706282 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706289 kernel: CPU45: Booted secondary processor 0x0000180100 [0x413fd0c1] Apr 12 20:48:31.706296 kernel: Detected PIPT I-cache on CPU46 Apr 12 20:48:31.706303 kernel: GICv3: CPU46: found redistributor 160100 region 0:0x00001001006e0000 Apr 12 20:48:31.706310 kernel: GICv3: CPU46: using allocated LPI pending table @0x0000080000a70000 Apr 12 20:48:31.706317 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706324 kernel: CPU46: Booted secondary processor 0x0000160100 [0x413fd0c1] Apr 12 20:48:31.706330 kernel: Detected PIPT I-cache on CPU47 Apr 12 20:48:31.706337 kernel: GICv3: CPU47: found redistributor 1e0100 region 0:0x00001001008e0000 Apr 12 20:48:31.706345 kernel: GICv3: CPU47: using allocated LPI pending table @0x0000080000a80000 Apr 12 20:48:31.706352 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706359 kernel: CPU47: Booted secondary processor 0x00001e0100 [0x413fd0c1] Apr 12 20:48:31.706366 kernel: Detected PIPT I-cache on CPU48 Apr 12 20:48:31.706373 kernel: GICv3: CPU48: found redistributor a0100 region 0:0x00001001003e0000 Apr 12 20:48:31.706379 kernel: GICv3: CPU48: using allocated LPI pending table @0x0000080000a90000 Apr 12 20:48:31.706386 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706393 kernel: CPU48: Booted secondary processor 0x00000a0100 [0x413fd0c1] Apr 12 20:48:31.706400 kernel: Detected PIPT I-cache on CPU49 Apr 12 20:48:31.706408 kernel: GICv3: CPU49: found redistributor 220100 region 0:0x00001001009e0000 Apr 12 20:48:31.706415 kernel: GICv3: CPU49: using allocated LPI pending table @0x0000080000aa0000 Apr 12 20:48:31.706422 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706429 kernel: CPU49: Booted secondary processor 0x0000220100 [0x413fd0c1] Apr 12 20:48:31.706435 kernel: Detected PIPT I-cache on CPU50 Apr 12 20:48:31.706442 kernel: GICv3: CPU50: found redistributor c0100 region 0:0x0000100100460000 Apr 12 20:48:31.706450 kernel: GICv3: CPU50: using allocated LPI pending table @0x0000080000ab0000 Apr 12 20:48:31.706456 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706465 kernel: CPU50: Booted secondary processor 0x00000c0100 [0x413fd0c1] Apr 12 20:48:31.706472 kernel: Detected PIPT I-cache on CPU51 Apr 12 20:48:31.706480 kernel: GICv3: CPU51: found redistributor 240100 region 0:0x0000100100a60000 Apr 12 20:48:31.706487 kernel: GICv3: CPU51: using allocated LPI pending table @0x0000080000ac0000 Apr 12 20:48:31.706494 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706501 kernel: CPU51: Booted secondary processor 0x0000240100 [0x413fd0c1] Apr 12 20:48:31.706507 kernel: Detected PIPT I-cache on CPU52 Apr 12 20:48:31.706514 kernel: GICv3: CPU52: found redistributor 80100 region 0:0x0000100100360000 Apr 12 20:48:31.706521 kernel: GICv3: CPU52: using allocated LPI pending table @0x0000080000ad0000 Apr 12 20:48:31.706528 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706536 kernel: CPU52: Booted secondary processor 0x0000080100 [0x413fd0c1] Apr 12 20:48:31.706544 kernel: Detected PIPT I-cache on CPU53 Apr 12 20:48:31.706551 kernel: GICv3: CPU53: found redistributor 200100 region 0:0x0000100100960000 Apr 12 20:48:31.706558 kernel: GICv3: CPU53: using allocated LPI pending table @0x0000080000ae0000 Apr 12 20:48:31.706565 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706571 kernel: CPU53: Booted secondary processor 0x0000200100 [0x413fd0c1] Apr 12 20:48:31.706578 kernel: Detected PIPT I-cache on CPU54 Apr 12 20:48:31.706585 kernel: GICv3: CPU54: found redistributor e0100 region 0:0x00001001004e0000 Apr 12 20:48:31.706592 kernel: GICv3: CPU54: using allocated LPI pending table @0x0000080000af0000 Apr 12 20:48:31.706599 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706605 kernel: CPU54: Booted secondary processor 0x00000e0100 [0x413fd0c1] Apr 12 20:48:31.706613 kernel: Detected PIPT I-cache on CPU55 Apr 12 20:48:31.706620 kernel: GICv3: CPU55: found redistributor 260100 region 0:0x0000100100ae0000 Apr 12 20:48:31.706627 kernel: GICv3: CPU55: using allocated LPI pending table @0x0000080000b00000 Apr 12 20:48:31.706634 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706641 kernel: CPU55: Booted secondary processor 0x0000260100 [0x413fd0c1] Apr 12 20:48:31.706647 kernel: Detected PIPT I-cache on CPU56 Apr 12 20:48:31.706654 kernel: GICv3: CPU56: found redistributor 20100 region 0:0x00001001001e0000 Apr 12 20:48:31.706661 kernel: GICv3: CPU56: using allocated LPI pending table @0x0000080000b10000 Apr 12 20:48:31.706668 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706676 kernel: CPU56: Booted secondary processor 0x0000020100 [0x413fd0c1] Apr 12 20:48:31.706683 kernel: Detected PIPT I-cache on CPU57 Apr 12 20:48:31.706689 kernel: GICv3: CPU57: found redistributor 40100 region 0:0x0000100100260000 Apr 12 20:48:31.706696 kernel: GICv3: CPU57: using allocated LPI pending table @0x0000080000b20000 Apr 12 20:48:31.706703 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706710 kernel: CPU57: Booted secondary processor 0x0000040100 [0x413fd0c1] Apr 12 20:48:31.706717 kernel: Detected PIPT I-cache on CPU58 Apr 12 20:48:31.706723 kernel: GICv3: CPU58: found redistributor 100 region 0:0x0000100100160000 Apr 12 20:48:31.706730 kernel: GICv3: CPU58: using allocated LPI pending table @0x0000080000b30000 Apr 12 20:48:31.706738 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706745 kernel: CPU58: Booted secondary processor 0x0000000100 [0x413fd0c1] Apr 12 20:48:31.706752 kernel: Detected PIPT I-cache on CPU59 Apr 12 20:48:31.706759 kernel: GICv3: CPU59: found redistributor 60100 region 0:0x00001001002e0000 Apr 12 20:48:31.706766 kernel: GICv3: CPU59: using allocated LPI pending table @0x0000080000b40000 Apr 12 20:48:31.706773 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706779 kernel: CPU59: Booted secondary processor 0x0000060100 [0x413fd0c1] Apr 12 20:48:31.706786 kernel: Detected PIPT I-cache on CPU60 Apr 12 20:48:31.706793 kernel: GICv3: CPU60: found redistributor 130100 region 0:0x0000100100620000 Apr 12 20:48:31.706800 kernel: GICv3: CPU60: using allocated LPI pending table @0x0000080000b50000 Apr 12 20:48:31.706808 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706815 kernel: CPU60: Booted secondary processor 0x0000130100 [0x413fd0c1] Apr 12 20:48:31.706821 kernel: Detected PIPT I-cache on CPU61 Apr 12 20:48:31.706828 kernel: GICv3: CPU61: found redistributor 1b0100 region 0:0x0000100100820000 Apr 12 20:48:31.706835 kernel: GICv3: CPU61: using allocated LPI pending table @0x0000080000b60000 Apr 12 20:48:31.706842 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706848 kernel: CPU61: Booted secondary processor 0x00001b0100 [0x413fd0c1] Apr 12 20:48:31.706855 kernel: Detected PIPT I-cache on CPU62 Apr 12 20:48:31.706862 kernel: GICv3: CPU62: found redistributor 150100 region 0:0x00001001006a0000 Apr 12 20:48:31.706870 kernel: GICv3: CPU62: using allocated LPI pending table @0x0000080000b70000 Apr 12 20:48:31.706877 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706884 kernel: CPU62: Booted secondary processor 0x0000150100 [0x413fd0c1] Apr 12 20:48:31.706890 kernel: Detected PIPT I-cache on CPU63 Apr 12 20:48:31.706897 kernel: GICv3: CPU63: found redistributor 1d0100 region 0:0x00001001008a0000 Apr 12 20:48:31.706904 kernel: GICv3: CPU63: using allocated LPI pending table @0x0000080000b80000 Apr 12 20:48:31.706911 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706918 kernel: CPU63: Booted secondary processor 0x00001d0100 [0x413fd0c1] Apr 12 20:48:31.706924 kernel: Detected PIPT I-cache on CPU64 Apr 12 20:48:31.706931 kernel: GICv3: CPU64: found redistributor 110100 region 0:0x00001001005a0000 Apr 12 20:48:31.706939 kernel: GICv3: CPU64: using allocated LPI pending table @0x0000080000b90000 Apr 12 20:48:31.706946 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706953 kernel: CPU64: Booted secondary processor 0x0000110100 [0x413fd0c1] Apr 12 20:48:31.706960 kernel: Detected PIPT I-cache on CPU65 Apr 12 20:48:31.706966 kernel: GICv3: CPU65: found redistributor 190100 region 0:0x00001001007a0000 Apr 12 20:48:31.706973 kernel: GICv3: CPU65: using allocated LPI pending table @0x0000080000ba0000 Apr 12 20:48:31.706980 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.706987 kernel: CPU65: Booted secondary processor 0x0000190100 [0x413fd0c1] Apr 12 20:48:31.706994 kernel: Detected PIPT I-cache on CPU66 Apr 12 20:48:31.707001 kernel: GICv3: CPU66: found redistributor 170100 region 0:0x0000100100720000 Apr 12 20:48:31.707008 kernel: GICv3: CPU66: using allocated LPI pending table @0x0000080000bb0000 Apr 12 20:48:31.707015 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707022 kernel: CPU66: Booted secondary processor 0x0000170100 [0x413fd0c1] Apr 12 20:48:31.707029 kernel: Detected PIPT I-cache on CPU67 Apr 12 20:48:31.707036 kernel: GICv3: CPU67: found redistributor 1f0100 region 0:0x0000100100920000 Apr 12 20:48:31.707042 kernel: GICv3: CPU67: using allocated LPI pending table @0x0000080000bc0000 Apr 12 20:48:31.707049 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707056 kernel: CPU67: Booted secondary processor 0x00001f0100 [0x413fd0c1] Apr 12 20:48:31.707063 kernel: Detected PIPT I-cache on CPU68 Apr 12 20:48:31.707071 kernel: GICv3: CPU68: found redistributor b0100 region 0:0x0000100100420000 Apr 12 20:48:31.707077 kernel: GICv3: CPU68: using allocated LPI pending table @0x0000080000bd0000 Apr 12 20:48:31.707084 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707091 kernel: CPU68: Booted secondary processor 0x00000b0100 [0x413fd0c1] Apr 12 20:48:31.707098 kernel: Detected PIPT I-cache on CPU69 Apr 12 20:48:31.707105 kernel: GICv3: CPU69: found redistributor 230100 region 0:0x0000100100a20000 Apr 12 20:48:31.707111 kernel: GICv3: CPU69: using allocated LPI pending table @0x0000080000be0000 Apr 12 20:48:31.707118 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707125 kernel: CPU69: Booted secondary processor 0x0000230100 [0x413fd0c1] Apr 12 20:48:31.707133 kernel: Detected PIPT I-cache on CPU70 Apr 12 20:48:31.707140 kernel: GICv3: CPU70: found redistributor d0100 region 0:0x00001001004a0000 Apr 12 20:48:31.707147 kernel: GICv3: CPU70: using allocated LPI pending table @0x0000080000bf0000 Apr 12 20:48:31.707154 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707160 kernel: CPU70: Booted secondary processor 0x00000d0100 [0x413fd0c1] Apr 12 20:48:31.707167 kernel: Detected PIPT I-cache on CPU71 Apr 12 20:48:31.707174 kernel: GICv3: CPU71: found redistributor 250100 region 0:0x0000100100aa0000 Apr 12 20:48:31.707181 kernel: GICv3: CPU71: using allocated LPI pending table @0x0000080000c00000 Apr 12 20:48:31.707187 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707194 kernel: CPU71: Booted secondary processor 0x0000250100 [0x413fd0c1] Apr 12 20:48:31.707203 kernel: Detected PIPT I-cache on CPU72 Apr 12 20:48:31.707209 kernel: GICv3: CPU72: found redistributor 90100 region 0:0x00001001003a0000 Apr 12 20:48:31.707216 kernel: GICv3: CPU72: using allocated LPI pending table @0x0000080000c10000 Apr 12 20:48:31.707223 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707230 kernel: CPU72: Booted secondary processor 0x0000090100 [0x413fd0c1] Apr 12 20:48:31.707237 kernel: Detected PIPT I-cache on CPU73 Apr 12 20:48:31.707243 kernel: GICv3: CPU73: found redistributor 210100 region 0:0x00001001009a0000 Apr 12 20:48:31.707250 kernel: GICv3: CPU73: using allocated LPI pending table @0x0000080000c20000 Apr 12 20:48:31.707257 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707265 kernel: CPU73: Booted secondary processor 0x0000210100 [0x413fd0c1] Apr 12 20:48:31.707272 kernel: Detected PIPT I-cache on CPU74 Apr 12 20:48:31.707279 kernel: GICv3: CPU74: found redistributor f0100 region 0:0x0000100100520000 Apr 12 20:48:31.707286 kernel: GICv3: CPU74: using allocated LPI pending table @0x0000080000c30000 Apr 12 20:48:31.707292 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707299 kernel: CPU74: Booted secondary processor 0x00000f0100 [0x413fd0c1] Apr 12 20:48:31.707306 kernel: Detected PIPT I-cache on CPU75 Apr 12 20:48:31.707313 kernel: GICv3: CPU75: found redistributor 270100 region 0:0x0000100100b20000 Apr 12 20:48:31.707320 kernel: GICv3: CPU75: using allocated LPI pending table @0x0000080000c40000 Apr 12 20:48:31.707328 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707334 kernel: CPU75: Booted secondary processor 0x0000270100 [0x413fd0c1] Apr 12 20:48:31.707341 kernel: Detected PIPT I-cache on CPU76 Apr 12 20:48:31.707348 kernel: GICv3: CPU76: found redistributor 30100 region 0:0x0000100100220000 Apr 12 20:48:31.707355 kernel: GICv3: CPU76: using allocated LPI pending table @0x0000080000c50000 Apr 12 20:48:31.707362 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707368 kernel: CPU76: Booted secondary processor 0x0000030100 [0x413fd0c1] Apr 12 20:48:31.707375 kernel: Detected PIPT I-cache on CPU77 Apr 12 20:48:31.707382 kernel: GICv3: CPU77: found redistributor 50100 region 0:0x00001001002a0000 Apr 12 20:48:31.707389 kernel: GICv3: CPU77: using allocated LPI pending table @0x0000080000c60000 Apr 12 20:48:31.707397 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707404 kernel: CPU77: Booted secondary processor 0x0000050100 [0x413fd0c1] Apr 12 20:48:31.707411 kernel: Detected PIPT I-cache on CPU78 Apr 12 20:48:31.707417 kernel: GICv3: CPU78: found redistributor 10100 region 0:0x00001001001a0000 Apr 12 20:48:31.707424 kernel: GICv3: CPU78: using allocated LPI pending table @0x0000080000c70000 Apr 12 20:48:31.707431 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707438 kernel: CPU78: Booted secondary processor 0x0000010100 [0x413fd0c1] Apr 12 20:48:31.707445 kernel: Detected PIPT I-cache on CPU79 Apr 12 20:48:31.707451 kernel: GICv3: CPU79: found redistributor 70100 region 0:0x0000100100320000 Apr 12 20:48:31.707461 kernel: GICv3: CPU79: using allocated LPI pending table @0x0000080000c80000 Apr 12 20:48:31.707468 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 20:48:31.707475 kernel: CPU79: Booted secondary processor 0x0000070100 [0x413fd0c1] Apr 12 20:48:31.707482 kernel: smp: Brought up 1 node, 80 CPUs Apr 12 20:48:31.707489 kernel: SMP: Total of 80 processors activated. Apr 12 20:48:31.707496 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 20:48:31.707503 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 20:48:31.707509 kernel: CPU features: detected: Common not Private translations Apr 12 20:48:31.707517 kernel: CPU features: detected: CRC32 instructions Apr 12 20:48:31.707525 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 20:48:31.707532 kernel: CPU features: detected: LSE atomic instructions Apr 12 20:48:31.707539 kernel: CPU features: detected: Privileged Access Never Apr 12 20:48:31.707545 kernel: CPU features: detected: RAS Extension Support Apr 12 20:48:31.707552 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 20:48:31.707559 kernel: CPU: All CPU(s) started at EL2 Apr 12 20:48:31.707566 kernel: devtmpfs: initialized Apr 12 20:48:31.707572 kernel: KASLR enabled Apr 12 20:48:31.707579 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 20:48:31.707586 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Apr 12 20:48:31.707595 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 20:48:31.707602 kernel: SMBIOS 3.4.0 present. Apr 12 20:48:31.707609 kernel: DMI: GIGABYTE R272-P30-JG/MP32-AR0-JG, BIOS F17a (SCP: 1.07.20210713) 07/22/2021 Apr 12 20:48:31.707616 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 20:48:31.707622 kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations Apr 12 20:48:31.707630 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 20:48:31.707637 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 20:48:31.707643 kernel: audit: initializing netlink subsys (disabled) Apr 12 20:48:31.707652 kernel: audit: type=2000 audit(0.053:1): state=initialized audit_enabled=0 res=1 Apr 12 20:48:31.707658 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 20:48:31.707665 kernel: cpuidle: using governor menu Apr 12 20:48:31.707672 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 20:48:31.707679 kernel: ASID allocator initialised with 32768 entries Apr 12 20:48:31.707686 kernel: ACPI: bus type PCI registered Apr 12 20:48:31.707693 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 20:48:31.707699 kernel: Serial: AMBA PL011 UART driver Apr 12 20:48:31.707706 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 20:48:31.707713 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 20:48:31.707721 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 20:48:31.707728 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 20:48:31.707735 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 20:48:31.707742 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 20:48:31.707749 kernel: ACPI: Added _OSI(Module Device) Apr 12 20:48:31.707756 kernel: ACPI: Added _OSI(Processor Device) Apr 12 20:48:31.707762 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 20:48:31.707769 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 20:48:31.707776 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 20:48:31.707784 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 20:48:31.707791 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 20:48:31.707798 kernel: ACPI: 2 ACPI AML tables successfully acquired and loaded Apr 12 20:48:31.707805 kernel: ACPI: Interpreter enabled Apr 12 20:48:31.707812 kernel: ACPI: Using GIC for interrupt routing Apr 12 20:48:31.707818 kernel: ACPI: MCFG table detected, 8 entries Apr 12 20:48:31.707825 kernel: ACPI: IORT: SMMU-v3[33ffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707832 kernel: ACPI: IORT: SMMU-v3[37ffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707839 kernel: ACPI: IORT: SMMU-v3[3bffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707847 kernel: ACPI: IORT: SMMU-v3[3fffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707854 kernel: ACPI: IORT: SMMU-v3[23ffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707861 kernel: ACPI: IORT: SMMU-v3[27ffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707867 kernel: ACPI: IORT: SMMU-v3[2bffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707874 kernel: ACPI: IORT: SMMU-v3[2fffe0000000] Mapped to Proximity domain 0 Apr 12 20:48:31.707881 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x100002600000 (irq = 19, base_baud = 0) is a SBSA Apr 12 20:48:31.707888 kernel: printk: console [ttyAMA0] enabled Apr 12 20:48:31.707895 kernel: ARMH0011:01: ttyAMA1 at MMIO 0x100002620000 (irq = 20, base_baud = 0) is a SBSA Apr 12 20:48:31.707902 kernel: ACPI: PCI Root Bridge [PCI1] (domain 000d [bus 00-ff]) Apr 12 20:48:31.708021 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.708087 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.708145 kernel: acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.708203 kernel: acpi PNP0A08:00: MCFG quirk: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.708260 kernel: acpi PNP0A08:00: ECAM area [mem 0x37fff0000000-0x37ffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.708318 kernel: acpi PNP0A08:00: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] Apr 12 20:48:31.708329 kernel: PCI host bridge to bus 000d:00 Apr 12 20:48:31.708395 kernel: pci_bus 000d:00: root bus resource [mem 0x50000000-0x5fffffff window] Apr 12 20:48:31.708450 kernel: pci_bus 000d:00: root bus resource [mem 0x340000000000-0x37ffdfffffff window] Apr 12 20:48:31.708506 kernel: pci_bus 000d:00: root bus resource [bus 00-ff] Apr 12 20:48:31.708577 kernel: pci 000d:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 20:48:31.708648 kernel: pci 000d:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 20:48:31.708711 kernel: pci 000d:00:01.0: enabling Extended Tags Apr 12 20:48:31.708770 kernel: pci 000d:00:01.0: supports D1 D2 Apr 12 20:48:31.708830 kernel: pci 000d:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.708897 kernel: pci 000d:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 20:48:31.708957 kernel: pci 000d:00:02.0: supports D1 D2 Apr 12 20:48:31.709016 kernel: pci 000d:00:02.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.709082 kernel: pci 000d:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 20:48:31.709144 kernel: pci 000d:00:03.0: supports D1 D2 Apr 12 20:48:31.709204 kernel: pci 000d:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.709271 kernel: pci 000d:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 20:48:31.709331 kernel: pci 000d:00:04.0: supports D1 D2 Apr 12 20:48:31.709389 kernel: pci 000d:00:04.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.709398 kernel: acpiphp: Slot [1] registered Apr 12 20:48:31.709405 kernel: acpiphp: Slot [2] registered Apr 12 20:48:31.709413 kernel: acpiphp: Slot [3] registered Apr 12 20:48:31.709420 kernel: acpiphp: Slot [4] registered Apr 12 20:48:31.709474 kernel: pci_bus 000d:00: on NUMA node 0 Apr 12 20:48:31.709534 kernel: pci 000d:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.709593 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.709653 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.709712 kernel: pci 000d:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.709772 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.709832 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.709898 kernel: pci 000d:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.709958 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.710016 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.710077 kernel: pci 000d:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.710138 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.710198 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.710261 kernel: pci 000d:00:01.0: BAR 14: assigned [mem 0x50000000-0x501fffff] Apr 12 20:48:31.710328 kernel: pci 000d:00:01.0: BAR 15: assigned [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 20:48:31.710389 kernel: pci 000d:00:02.0: BAR 14: assigned [mem 0x50200000-0x503fffff] Apr 12 20:48:31.710452 kernel: pci 000d:00:02.0: BAR 15: assigned [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 20:48:31.710514 kernel: pci 000d:00:03.0: BAR 14: assigned [mem 0x50400000-0x505fffff] Apr 12 20:48:31.710582 kernel: pci 000d:00:03.0: BAR 15: assigned [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 20:48:31.710644 kernel: pci 000d:00:04.0: BAR 14: assigned [mem 0x50600000-0x507fffff] Apr 12 20:48:31.710705 kernel: pci 000d:00:04.0: BAR 15: assigned [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 20:48:31.710765 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.710824 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.710884 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.710944 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711004 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.711065 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711124 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.711185 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711244 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.711304 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711362 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.711426 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711491 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.711550 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711611 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.711672 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.711731 kernel: pci 000d:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.711790 kernel: pci 000d:00:01.0: bridge window [mem 0x50000000-0x501fffff] Apr 12 20:48:31.711849 kernel: pci 000d:00:01.0: bridge window [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 20:48:31.711908 kernel: pci 000d:00:02.0: PCI bridge to [bus 02] Apr 12 20:48:31.711966 kernel: pci 000d:00:02.0: bridge window [mem 0x50200000-0x503fffff] Apr 12 20:48:31.712025 kernel: pci 000d:00:02.0: bridge window [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 20:48:31.712086 kernel: pci 000d:00:03.0: PCI bridge to [bus 03] Apr 12 20:48:31.712145 kernel: pci 000d:00:03.0: bridge window [mem 0x50400000-0x505fffff] Apr 12 20:48:31.712203 kernel: pci 000d:00:03.0: bridge window [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 20:48:31.712262 kernel: pci 000d:00:04.0: PCI bridge to [bus 04] Apr 12 20:48:31.712321 kernel: pci 000d:00:04.0: bridge window [mem 0x50600000-0x507fffff] Apr 12 20:48:31.712380 kernel: pci 000d:00:04.0: bridge window [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 20:48:31.712436 kernel: pci_bus 000d:00: resource 4 [mem 0x50000000-0x5fffffff window] Apr 12 20:48:31.712501 kernel: pci_bus 000d:00: resource 5 [mem 0x340000000000-0x37ffdfffffff window] Apr 12 20:48:31.712568 kernel: pci_bus 000d:01: resource 1 [mem 0x50000000-0x501fffff] Apr 12 20:48:31.712625 kernel: pci_bus 000d:01: resource 2 [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 20:48:31.712689 kernel: pci_bus 000d:02: resource 1 [mem 0x50200000-0x503fffff] Apr 12 20:48:31.712747 kernel: pci_bus 000d:02: resource 2 [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 20:48:31.712821 kernel: pci_bus 000d:03: resource 1 [mem 0x50400000-0x505fffff] Apr 12 20:48:31.712877 kernel: pci_bus 000d:03: resource 2 [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 20:48:31.712942 kernel: pci_bus 000d:04: resource 1 [mem 0x50600000-0x507fffff] Apr 12 20:48:31.712998 kernel: pci_bus 000d:04: resource 2 [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 20:48:31.713007 kernel: ACPI: PCI Root Bridge [PCI3] (domain 0000 [bus 00-ff]) Apr 12 20:48:31.713072 kernel: acpi PNP0A08:01: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.713131 kernel: acpi PNP0A08:01: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.713189 kernel: acpi PNP0A08:01: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.713246 kernel: acpi PNP0A08:01: MCFG quirk: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.713303 kernel: acpi PNP0A08:01: ECAM area [mem 0x3ffff0000000-0x3fffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.713361 kernel: acpi PNP0A08:01: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] Apr 12 20:48:31.713371 kernel: PCI host bridge to bus 0000:00 Apr 12 20:48:31.713432 kernel: pci_bus 0000:00: root bus resource [mem 0x70000000-0x7fffffff window] Apr 12 20:48:31.713490 kernel: pci_bus 0000:00: root bus resource [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 20:48:31.713543 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 20:48:31.713611 kernel: pci 0000:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 20:48:31.713680 kernel: pci 0000:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 20:48:31.713741 kernel: pci 0000:00:01.0: enabling Extended Tags Apr 12 20:48:31.713800 kernel: pci 0000:00:01.0: supports D1 D2 Apr 12 20:48:31.713859 kernel: pci 0000:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.713928 kernel: pci 0000:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 20:48:31.713989 kernel: pci 0000:00:02.0: supports D1 D2 Apr 12 20:48:31.714047 kernel: pci 0000:00:02.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.714113 kernel: pci 0000:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 20:48:31.714172 kernel: pci 0000:00:03.0: supports D1 D2 Apr 12 20:48:31.714232 kernel: pci 0000:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.714300 kernel: pci 0000:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 20:48:31.714364 kernel: pci 0000:00:04.0: supports D1 D2 Apr 12 20:48:31.714429 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.714437 kernel: acpiphp: Slot [1-1] registered Apr 12 20:48:31.714444 kernel: acpiphp: Slot [2-1] registered Apr 12 20:48:31.714451 kernel: acpiphp: Slot [3-1] registered Apr 12 20:48:31.714461 kernel: acpiphp: Slot [4-1] registered Apr 12 20:48:31.714514 kernel: pci_bus 0000:00: on NUMA node 0 Apr 12 20:48:31.714575 kernel: pci 0000:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.714638 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.714698 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.714761 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.714821 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.714880 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.714940 kernel: pci 0000:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.715001 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.715062 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.715122 kernel: pci 0000:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.715182 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.715241 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.715301 kernel: pci 0000:00:01.0: BAR 14: assigned [mem 0x70000000-0x701fffff] Apr 12 20:48:31.715360 kernel: pci 0000:00:01.0: BAR 15: assigned [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 20:48:31.715420 kernel: pci 0000:00:02.0: BAR 14: assigned [mem 0x70200000-0x703fffff] Apr 12 20:48:31.715483 kernel: pci 0000:00:02.0: BAR 15: assigned [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 20:48:31.715543 kernel: pci 0000:00:03.0: BAR 14: assigned [mem 0x70400000-0x705fffff] Apr 12 20:48:31.715603 kernel: pci 0000:00:03.0: BAR 15: assigned [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 20:48:31.715661 kernel: pci 0000:00:04.0: BAR 14: assigned [mem 0x70600000-0x707fffff] Apr 12 20:48:31.715722 kernel: pci 0000:00:04.0: BAR 15: assigned [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 20:48:31.715780 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.715840 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.715900 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.715961 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716021 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.716081 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716143 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.716202 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716261 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.716319 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716379 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.716440 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716503 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.716561 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716620 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.716679 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.716738 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.716798 kernel: pci 0000:00:01.0: bridge window [mem 0x70000000-0x701fffff] Apr 12 20:48:31.716858 kernel: pci 0000:00:01.0: bridge window [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 20:48:31.716919 kernel: pci 0000:00:02.0: PCI bridge to [bus 02] Apr 12 20:48:31.716978 kernel: pci 0000:00:02.0: bridge window [mem 0x70200000-0x703fffff] Apr 12 20:48:31.717037 kernel: pci 0000:00:02.0: bridge window [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 20:48:31.717096 kernel: pci 0000:00:03.0: PCI bridge to [bus 03] Apr 12 20:48:31.717156 kernel: pci 0000:00:03.0: bridge window [mem 0x70400000-0x705fffff] Apr 12 20:48:31.717216 kernel: pci 0000:00:03.0: bridge window [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 20:48:31.717278 kernel: pci 0000:00:04.0: PCI bridge to [bus 04] Apr 12 20:48:31.717337 kernel: pci 0000:00:04.0: bridge window [mem 0x70600000-0x707fffff] Apr 12 20:48:31.717397 kernel: pci 0000:00:04.0: bridge window [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 20:48:31.717451 kernel: pci_bus 0000:00: resource 4 [mem 0x70000000-0x7fffffff window] Apr 12 20:48:31.717521 kernel: pci_bus 0000:00: resource 5 [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 20:48:31.717586 kernel: pci_bus 0000:01: resource 1 [mem 0x70000000-0x701fffff] Apr 12 20:48:31.717641 kernel: pci_bus 0000:01: resource 2 [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 20:48:31.717704 kernel: pci_bus 0000:02: resource 1 [mem 0x70200000-0x703fffff] Apr 12 20:48:31.717758 kernel: pci_bus 0000:02: resource 2 [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 20:48:31.717827 kernel: pci_bus 0000:03: resource 1 [mem 0x70400000-0x705fffff] Apr 12 20:48:31.717884 kernel: pci_bus 0000:03: resource 2 [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 20:48:31.717948 kernel: pci_bus 0000:04: resource 1 [mem 0x70600000-0x707fffff] Apr 12 20:48:31.718003 kernel: pci_bus 0000:04: resource 2 [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 20:48:31.718012 kernel: ACPI: PCI Root Bridge [PCI7] (domain 0005 [bus 00-ff]) Apr 12 20:48:31.718079 kernel: acpi PNP0A08:02: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.718137 kernel: acpi PNP0A08:02: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.718196 kernel: acpi PNP0A08:02: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.718254 kernel: acpi PNP0A08:02: MCFG quirk: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.718310 kernel: acpi PNP0A08:02: ECAM area [mem 0x2ffff0000000-0x2fffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.718368 kernel: acpi PNP0A08:02: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] Apr 12 20:48:31.718377 kernel: PCI host bridge to bus 0005:00 Apr 12 20:48:31.718436 kernel: pci_bus 0005:00: root bus resource [mem 0x30000000-0x3fffffff window] Apr 12 20:48:31.718494 kernel: pci_bus 0005:00: root bus resource [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 20:48:31.718548 kernel: pci_bus 0005:00: root bus resource [bus 00-ff] Apr 12 20:48:31.718617 kernel: pci 0005:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 20:48:31.718684 kernel: pci 0005:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 20:48:31.718744 kernel: pci 0005:00:01.0: supports D1 D2 Apr 12 20:48:31.718804 kernel: pci 0005:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.718870 kernel: pci 0005:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 20:48:31.718931 kernel: pci 0005:00:03.0: supports D1 D2 Apr 12 20:48:31.718991 kernel: pci 0005:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.719058 kernel: pci 0005:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 20:48:31.719116 kernel: pci 0005:00:05.0: supports D1 D2 Apr 12 20:48:31.719175 kernel: pci 0005:00:05.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.719241 kernel: pci 0005:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 20:48:31.719302 kernel: pci 0005:00:07.0: supports D1 D2 Apr 12 20:48:31.719363 kernel: pci 0005:00:07.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.719373 kernel: acpiphp: Slot [1-2] registered Apr 12 20:48:31.719380 kernel: acpiphp: Slot [2-2] registered Apr 12 20:48:31.719447 kernel: pci 0005:03:00.0: [144d:a808] type 00 class 0x010802 Apr 12 20:48:31.719514 kernel: pci 0005:03:00.0: reg 0x10: [mem 0x30110000-0x30113fff 64bit] Apr 12 20:48:31.719576 kernel: pci 0005:03:00.0: reg 0x30: [mem 0x30100000-0x3010ffff pref] Apr 12 20:48:31.719647 kernel: pci 0005:04:00.0: [144d:a808] type 00 class 0x010802 Apr 12 20:48:31.719710 kernel: pci 0005:04:00.0: reg 0x10: [mem 0x30010000-0x30013fff 64bit] Apr 12 20:48:31.719774 kernel: pci 0005:04:00.0: reg 0x30: [mem 0x30000000-0x3000ffff pref] Apr 12 20:48:31.719827 kernel: pci_bus 0005:00: on NUMA node 0 Apr 12 20:48:31.719887 kernel: pci 0005:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.719947 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.720006 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.720066 kernel: pci 0005:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.720126 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.720187 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.720246 kernel: pci 0005:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.720306 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.720364 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 20:48:31.720423 kernel: pci 0005:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.720487 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.720550 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x001fffff] to [bus 04] add_size 100000 add_align 100000 Apr 12 20:48:31.720613 kernel: pci 0005:00:01.0: BAR 14: assigned [mem 0x30000000-0x301fffff] Apr 12 20:48:31.720672 kernel: pci 0005:00:01.0: BAR 15: assigned [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 20:48:31.720732 kernel: pci 0005:00:03.0: BAR 14: assigned [mem 0x30200000-0x303fffff] Apr 12 20:48:31.720792 kernel: pci 0005:00:03.0: BAR 15: assigned [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 20:48:31.720851 kernel: pci 0005:00:05.0: BAR 14: assigned [mem 0x30400000-0x305fffff] Apr 12 20:48:31.720911 kernel: pci 0005:00:05.0: BAR 15: assigned [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 20:48:31.720969 kernel: pci 0005:00:07.0: BAR 14: assigned [mem 0x30600000-0x307fffff] Apr 12 20:48:31.721030 kernel: pci 0005:00:07.0: BAR 15: assigned [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 20:48:31.721088 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721148 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721206 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721265 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721322 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721380 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721440 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721503 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721563 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721621 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721681 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721739 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721797 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721856 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.721914 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.721974 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.722033 kernel: pci 0005:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.722093 kernel: pci 0005:00:01.0: bridge window [mem 0x30000000-0x301fffff] Apr 12 20:48:31.722153 kernel: pci 0005:00:01.0: bridge window [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 20:48:31.722212 kernel: pci 0005:00:03.0: PCI bridge to [bus 02] Apr 12 20:48:31.722271 kernel: pci 0005:00:03.0: bridge window [mem 0x30200000-0x303fffff] Apr 12 20:48:31.722329 kernel: pci 0005:00:03.0: bridge window [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 20:48:31.722396 kernel: pci 0005:03:00.0: BAR 6: assigned [mem 0x30400000-0x3040ffff pref] Apr 12 20:48:31.722460 kernel: pci 0005:03:00.0: BAR 0: assigned [mem 0x30410000-0x30413fff 64bit] Apr 12 20:48:31.722520 kernel: pci 0005:00:05.0: PCI bridge to [bus 03] Apr 12 20:48:31.722579 kernel: pci 0005:00:05.0: bridge window [mem 0x30400000-0x305fffff] Apr 12 20:48:31.722639 kernel: pci 0005:00:05.0: bridge window [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 20:48:31.722701 kernel: pci 0005:04:00.0: BAR 6: assigned [mem 0x30600000-0x3060ffff pref] Apr 12 20:48:31.722764 kernel: pci 0005:04:00.0: BAR 0: assigned [mem 0x30610000-0x30613fff 64bit] Apr 12 20:48:31.722823 kernel: pci 0005:00:07.0: PCI bridge to [bus 04] Apr 12 20:48:31.722883 kernel: pci 0005:00:07.0: bridge window [mem 0x30600000-0x307fffff] Apr 12 20:48:31.722942 kernel: pci 0005:00:07.0: bridge window [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 20:48:31.722997 kernel: pci_bus 0005:00: resource 4 [mem 0x30000000-0x3fffffff window] Apr 12 20:48:31.723050 kernel: pci_bus 0005:00: resource 5 [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 20:48:31.723114 kernel: pci_bus 0005:01: resource 1 [mem 0x30000000-0x301fffff] Apr 12 20:48:31.723171 kernel: pci_bus 0005:01: resource 2 [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 20:48:31.723245 kernel: pci_bus 0005:02: resource 1 [mem 0x30200000-0x303fffff] Apr 12 20:48:31.723301 kernel: pci_bus 0005:02: resource 2 [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 20:48:31.723364 kernel: pci_bus 0005:03: resource 1 [mem 0x30400000-0x305fffff] Apr 12 20:48:31.723419 kernel: pci_bus 0005:03: resource 2 [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 20:48:31.723487 kernel: pci_bus 0005:04: resource 1 [mem 0x30600000-0x307fffff] Apr 12 20:48:31.723544 kernel: pci_bus 0005:04: resource 2 [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 20:48:31.723553 kernel: ACPI: PCI Root Bridge [PCI5] (domain 0003 [bus 00-ff]) Apr 12 20:48:31.723621 kernel: acpi PNP0A08:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.723679 kernel: acpi PNP0A08:03: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.723738 kernel: acpi PNP0A08:03: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.723794 kernel: acpi PNP0A08:03: MCFG quirk: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.723851 kernel: acpi PNP0A08:03: ECAM area [mem 0x27fff0000000-0x27ffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.723910 kernel: acpi PNP0A08:03: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] Apr 12 20:48:31.723919 kernel: PCI host bridge to bus 0003:00 Apr 12 20:48:31.723978 kernel: pci_bus 0003:00: root bus resource [mem 0x10000000-0x1fffffff window] Apr 12 20:48:31.724032 kernel: pci_bus 0003:00: root bus resource [mem 0x240000000000-0x27ffdfffffff window] Apr 12 20:48:31.724085 kernel: pci_bus 0003:00: root bus resource [bus 00-ff] Apr 12 20:48:31.724152 kernel: pci 0003:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 20:48:31.724220 kernel: pci 0003:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 20:48:31.724283 kernel: pci 0003:00:01.0: supports D1 D2 Apr 12 20:48:31.724342 kernel: pci 0003:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.724408 kernel: pci 0003:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 20:48:31.724471 kernel: pci 0003:00:03.0: supports D1 D2 Apr 12 20:48:31.724531 kernel: pci 0003:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.724598 kernel: pci 0003:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 20:48:31.724659 kernel: pci 0003:00:05.0: supports D1 D2 Apr 12 20:48:31.724719 kernel: pci 0003:00:05.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.724728 kernel: acpiphp: Slot [1-3] registered Apr 12 20:48:31.724735 kernel: acpiphp: Slot [2-3] registered Apr 12 20:48:31.724802 kernel: pci 0003:03:00.0: [8086:1521] type 00 class 0x020000 Apr 12 20:48:31.724866 kernel: pci 0003:03:00.0: reg 0x10: [mem 0x10020000-0x1003ffff] Apr 12 20:48:31.724929 kernel: pci 0003:03:00.0: reg 0x18: [io 0x0020-0x003f] Apr 12 20:48:31.724992 kernel: pci 0003:03:00.0: reg 0x1c: [mem 0x10044000-0x10047fff] Apr 12 20:48:31.725055 kernel: pci 0003:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:48:31.725115 kernel: pci 0003:03:00.0: reg 0x184: [mem 0x240000060000-0x240000063fff 64bit pref] Apr 12 20:48:31.725178 kernel: pci 0003:03:00.0: VF(n) BAR0 space: [mem 0x240000060000-0x24000007ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:48:31.725241 kernel: pci 0003:03:00.0: reg 0x190: [mem 0x240000040000-0x240000043fff 64bit pref] Apr 12 20:48:31.725307 kernel: pci 0003:03:00.0: VF(n) BAR3 space: [mem 0x240000040000-0x24000005ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 20:48:31.725371 kernel: pci 0003:03:00.0: 8.000 Gb/s available PCIe bandwidth, limited by 5.0 GT/s PCIe x2 link at 0003:00:05.0 (capable of 16.000 Gb/s with 5.0 GT/s PCIe x4 link) Apr 12 20:48:31.725444 kernel: pci 0003:03:00.1: [8086:1521] type 00 class 0x020000 Apr 12 20:48:31.725511 kernel: pci 0003:03:00.1: reg 0x10: [mem 0x10000000-0x1001ffff] Apr 12 20:48:31.725573 kernel: pci 0003:03:00.1: reg 0x18: [io 0x0000-0x001f] Apr 12 20:48:31.725635 kernel: pci 0003:03:00.1: reg 0x1c: [mem 0x10040000-0x10043fff] Apr 12 20:48:31.725696 kernel: pci 0003:03:00.1: PME# supported from D0 D3hot D3cold Apr 12 20:48:31.725757 kernel: pci 0003:03:00.1: reg 0x184: [mem 0x240000020000-0x240000023fff 64bit pref] Apr 12 20:48:31.725819 kernel: pci 0003:03:00.1: VF(n) BAR0 space: [mem 0x240000020000-0x24000003ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:48:31.725881 kernel: pci 0003:03:00.1: reg 0x190: [mem 0x240000000000-0x240000003fff 64bit pref] Apr 12 20:48:31.725944 kernel: pci 0003:03:00.1: VF(n) BAR3 space: [mem 0x240000000000-0x24000001ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 20:48:31.725998 kernel: pci_bus 0003:00: on NUMA node 0 Apr 12 20:48:31.726057 kernel: pci 0003:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.726118 kernel: pci 0003:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.726176 kernel: pci 0003:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.726237 kernel: pci 0003:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.726295 kernel: pci 0003:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.726355 kernel: pci 0003:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.726417 kernel: pci 0003:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03-04] add_size 300000 add_align 100000 Apr 12 20:48:31.726591 kernel: pci 0003:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03-04] add_size 100000 add_align 100000 Apr 12 20:48:31.726656 kernel: pci 0003:00:01.0: BAR 14: assigned [mem 0x10000000-0x101fffff] Apr 12 20:48:31.726714 kernel: pci 0003:00:01.0: BAR 15: assigned [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 20:48:31.726772 kernel: pci 0003:00:03.0: BAR 14: assigned [mem 0x10200000-0x103fffff] Apr 12 20:48:31.726830 kernel: pci 0003:00:03.0: BAR 15: assigned [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 20:48:31.726887 kernel: pci 0003:00:05.0: BAR 14: assigned [mem 0x10400000-0x105fffff] Apr 12 20:48:31.726948 kernel: pci 0003:00:05.0: BAR 15: assigned [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 20:48:31.727005 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.727063 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.727119 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.727176 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.727234 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.727301 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.727360 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.727420 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.727482 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.727540 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.727598 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.727655 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.727712 kernel: pci 0003:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.727769 kernel: pci 0003:00:01.0: bridge window [mem 0x10000000-0x101fffff] Apr 12 20:48:31.727827 kernel: pci 0003:00:01.0: bridge window [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 20:48:31.727887 kernel: pci 0003:00:03.0: PCI bridge to [bus 02] Apr 12 20:48:31.727945 kernel: pci 0003:00:03.0: bridge window [mem 0x10200000-0x103fffff] Apr 12 20:48:31.728003 kernel: pci 0003:00:03.0: bridge window [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 20:48:31.728066 kernel: pci 0003:03:00.0: BAR 0: assigned [mem 0x10400000-0x1041ffff] Apr 12 20:48:31.728129 kernel: pci 0003:03:00.1: BAR 0: assigned [mem 0x10420000-0x1043ffff] Apr 12 20:48:31.728189 kernel: pci 0003:03:00.0: BAR 3: assigned [mem 0x10440000-0x10443fff] Apr 12 20:48:31.728251 kernel: pci 0003:03:00.0: BAR 7: assigned [mem 0x240000400000-0x24000041ffff 64bit pref] Apr 12 20:48:31.728312 kernel: pci 0003:03:00.0: BAR 10: assigned [mem 0x240000420000-0x24000043ffff 64bit pref] Apr 12 20:48:31.728374 kernel: pci 0003:03:00.1: BAR 3: assigned [mem 0x10444000-0x10447fff] Apr 12 20:48:31.728434 kernel: pci 0003:03:00.1: BAR 7: assigned [mem 0x240000440000-0x24000045ffff 64bit pref] Apr 12 20:48:31.728498 kernel: pci 0003:03:00.1: BAR 10: assigned [mem 0x240000460000-0x24000047ffff 64bit pref] Apr 12 20:48:31.728560 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 20:48:31.728620 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 20:48:31.728682 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 20:48:31.728742 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 20:48:31.728803 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 20:48:31.728863 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 20:48:31.728923 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 20:48:31.728984 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 20:48:31.729042 kernel: pci 0003:00:05.0: PCI bridge to [bus 03-04] Apr 12 20:48:31.729099 kernel: pci 0003:00:05.0: bridge window [mem 0x10400000-0x105fffff] Apr 12 20:48:31.729159 kernel: pci 0003:00:05.0: bridge window [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 20:48:31.729214 kernel: pci_bus 0003:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 20:48:31.729265 kernel: pci_bus 0003:00: resource 4 [mem 0x10000000-0x1fffffff window] Apr 12 20:48:31.729318 kernel: pci_bus 0003:00: resource 5 [mem 0x240000000000-0x27ffdfffffff window] Apr 12 20:48:31.729389 kernel: pci_bus 0003:01: resource 1 [mem 0x10000000-0x101fffff] Apr 12 20:48:31.729447 kernel: pci_bus 0003:01: resource 2 [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 20:48:31.729514 kernel: pci_bus 0003:02: resource 1 [mem 0x10200000-0x103fffff] Apr 12 20:48:31.729570 kernel: pci_bus 0003:02: resource 2 [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 20:48:31.729632 kernel: pci_bus 0003:03: resource 1 [mem 0x10400000-0x105fffff] Apr 12 20:48:31.729688 kernel: pci_bus 0003:03: resource 2 [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 20:48:31.729697 kernel: ACPI: PCI Root Bridge [PCI0] (domain 000c [bus 00-ff]) Apr 12 20:48:31.729761 kernel: acpi PNP0A08:04: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.729820 kernel: acpi PNP0A08:04: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.729878 kernel: acpi PNP0A08:04: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.729937 kernel: acpi PNP0A08:04: MCFG quirk: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.730000 kernel: acpi PNP0A08:04: ECAM area [mem 0x33fff0000000-0x33ffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.730057 kernel: acpi PNP0A08:04: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] Apr 12 20:48:31.730067 kernel: PCI host bridge to bus 000c:00 Apr 12 20:48:31.730130 kernel: pci_bus 000c:00: root bus resource [mem 0x40000000-0x4fffffff window] Apr 12 20:48:31.730187 kernel: pci_bus 000c:00: root bus resource [mem 0x300000000000-0x33ffdfffffff window] Apr 12 20:48:31.730271 kernel: pci_bus 000c:00: root bus resource [bus 00-ff] Apr 12 20:48:31.730344 kernel: pci 000c:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 20:48:31.730411 kernel: pci 000c:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 20:48:31.730476 kernel: pci 000c:00:01.0: enabling Extended Tags Apr 12 20:48:31.730535 kernel: pci 000c:00:01.0: supports D1 D2 Apr 12 20:48:31.730596 kernel: pci 000c:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.730663 kernel: pci 000c:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 20:48:31.730724 kernel: pci 000c:00:02.0: supports D1 D2 Apr 12 20:48:31.730783 kernel: pci 000c:00:02.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.730852 kernel: pci 000c:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 20:48:31.730913 kernel: pci 000c:00:03.0: supports D1 D2 Apr 12 20:48:31.730971 kernel: pci 000c:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.731038 kernel: pci 000c:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 20:48:31.731106 kernel: pci 000c:00:04.0: supports D1 D2 Apr 12 20:48:31.731166 kernel: pci 000c:00:04.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.731175 kernel: acpiphp: Slot [1-4] registered Apr 12 20:48:31.731183 kernel: acpiphp: Slot [2-4] registered Apr 12 20:48:31.731190 kernel: acpiphp: Slot [3-2] registered Apr 12 20:48:31.731197 kernel: acpiphp: Slot [4-2] registered Apr 12 20:48:31.731249 kernel: pci_bus 000c:00: on NUMA node 0 Apr 12 20:48:31.731308 kernel: pci 000c:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.731368 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.731429 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.731564 kernel: pci 000c:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.731626 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.731685 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.731744 kernel: pci 000c:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.731803 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.731864 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.731923 kernel: pci 000c:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.731982 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.732040 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.732099 kernel: pci 000c:00:01.0: BAR 14: assigned [mem 0x40000000-0x401fffff] Apr 12 20:48:31.732158 kernel: pci 000c:00:01.0: BAR 15: assigned [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 20:48:31.732216 kernel: pci 000c:00:02.0: BAR 14: assigned [mem 0x40200000-0x403fffff] Apr 12 20:48:31.732276 kernel: pci 000c:00:02.0: BAR 15: assigned [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 20:48:31.732335 kernel: pci 000c:00:03.0: BAR 14: assigned [mem 0x40400000-0x405fffff] Apr 12 20:48:31.732393 kernel: pci 000c:00:03.0: BAR 15: assigned [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 20:48:31.732452 kernel: pci 000c:00:04.0: BAR 14: assigned [mem 0x40600000-0x407fffff] Apr 12 20:48:31.732513 kernel: pci 000c:00:04.0: BAR 15: assigned [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 20:48:31.732572 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.732631 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.732690 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.732750 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.732808 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.732866 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.732924 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.732983 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.733041 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.733099 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.733158 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.733216 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.733275 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.733334 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.733393 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.733451 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.733512 kernel: pci 000c:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.733572 kernel: pci 000c:00:01.0: bridge window [mem 0x40000000-0x401fffff] Apr 12 20:48:31.733630 kernel: pci 000c:00:01.0: bridge window [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 20:48:31.733689 kernel: pci 000c:00:02.0: PCI bridge to [bus 02] Apr 12 20:48:31.733749 kernel: pci 000c:00:02.0: bridge window [mem 0x40200000-0x403fffff] Apr 12 20:48:31.733808 kernel: pci 000c:00:02.0: bridge window [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 20:48:31.733868 kernel: pci 000c:00:03.0: PCI bridge to [bus 03] Apr 12 20:48:31.733926 kernel: pci 000c:00:03.0: bridge window [mem 0x40400000-0x405fffff] Apr 12 20:48:31.733986 kernel: pci 000c:00:03.0: bridge window [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 20:48:31.734046 kernel: pci 000c:00:04.0: PCI bridge to [bus 04] Apr 12 20:48:31.734107 kernel: pci 000c:00:04.0: bridge window [mem 0x40600000-0x407fffff] Apr 12 20:48:31.734166 kernel: pci 000c:00:04.0: bridge window [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 20:48:31.734221 kernel: pci_bus 000c:00: resource 4 [mem 0x40000000-0x4fffffff window] Apr 12 20:48:31.734274 kernel: pci_bus 000c:00: resource 5 [mem 0x300000000000-0x33ffdfffffff window] Apr 12 20:48:31.734339 kernel: pci_bus 000c:01: resource 1 [mem 0x40000000-0x401fffff] Apr 12 20:48:31.734396 kernel: pci_bus 000c:01: resource 2 [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 20:48:31.734462 kernel: pci_bus 000c:02: resource 1 [mem 0x40200000-0x403fffff] Apr 12 20:48:31.734520 kernel: pci_bus 000c:02: resource 2 [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 20:48:31.734592 kernel: pci_bus 000c:03: resource 1 [mem 0x40400000-0x405fffff] Apr 12 20:48:31.734648 kernel: pci_bus 000c:03: resource 2 [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 20:48:31.734711 kernel: pci_bus 000c:04: resource 1 [mem 0x40600000-0x407fffff] Apr 12 20:48:31.734766 kernel: pci_bus 000c:04: resource 2 [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 20:48:31.734777 kernel: ACPI: PCI Root Bridge [PCI4] (domain 0002 [bus 00-ff]) Apr 12 20:48:31.734842 kernel: acpi PNP0A08:05: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.734900 kernel: acpi PNP0A08:05: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.734958 kernel: acpi PNP0A08:05: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.735015 kernel: acpi PNP0A08:05: MCFG quirk: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.735072 kernel: acpi PNP0A08:05: ECAM area [mem 0x23fff0000000-0x23ffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.735129 kernel: acpi PNP0A08:05: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] Apr 12 20:48:31.735140 kernel: PCI host bridge to bus 0002:00 Apr 12 20:48:31.735201 kernel: pci_bus 0002:00: root bus resource [mem 0x00800000-0x0fffffff window] Apr 12 20:48:31.735254 kernel: pci_bus 0002:00: root bus resource [mem 0x200000000000-0x23ffdfffffff window] Apr 12 20:48:31.735306 kernel: pci_bus 0002:00: root bus resource [bus 00-ff] Apr 12 20:48:31.735373 kernel: pci 0002:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 20:48:31.735440 kernel: pci 0002:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 20:48:31.735504 kernel: pci 0002:00:01.0: supports D1 D2 Apr 12 20:48:31.735565 kernel: pci 0002:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.735632 kernel: pci 0002:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 20:48:31.735691 kernel: pci 0002:00:03.0: supports D1 D2 Apr 12 20:48:31.735750 kernel: pci 0002:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.735816 kernel: pci 0002:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 20:48:31.735877 kernel: pci 0002:00:05.0: supports D1 D2 Apr 12 20:48:31.735936 kernel: pci 0002:00:05.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.736003 kernel: pci 0002:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 20:48:31.736064 kernel: pci 0002:00:07.0: supports D1 D2 Apr 12 20:48:31.736122 kernel: pci 0002:00:07.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.736131 kernel: acpiphp: Slot [1-5] registered Apr 12 20:48:31.736138 kernel: acpiphp: Slot [2-5] registered Apr 12 20:48:31.736145 kernel: acpiphp: Slot [3-3] registered Apr 12 20:48:31.736153 kernel: acpiphp: Slot [4-3] registered Apr 12 20:48:31.736204 kernel: pci_bus 0002:00: on NUMA node 0 Apr 12 20:48:31.736264 kernel: pci 0002:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.736323 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.736382 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 20:48:31.736443 kernel: pci 0002:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.736506 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.736566 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.736626 kernel: pci 0002:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.736685 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.736744 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.736803 kernel: pci 0002:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.736861 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.736922 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.736981 kernel: pci 0002:00:01.0: BAR 14: assigned [mem 0x00800000-0x009fffff] Apr 12 20:48:31.737041 kernel: pci 0002:00:01.0: BAR 15: assigned [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 20:48:31.737101 kernel: pci 0002:00:03.0: BAR 14: assigned [mem 0x00a00000-0x00bfffff] Apr 12 20:48:31.737160 kernel: pci 0002:00:03.0: BAR 15: assigned [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 20:48:31.737221 kernel: pci 0002:00:05.0: BAR 14: assigned [mem 0x00c00000-0x00dfffff] Apr 12 20:48:31.737280 kernel: pci 0002:00:05.0: BAR 15: assigned [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 20:48:31.737340 kernel: pci 0002:00:07.0: BAR 14: assigned [mem 0x00e00000-0x00ffffff] Apr 12 20:48:31.737401 kernel: pci 0002:00:07.0: BAR 15: assigned [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 20:48:31.737463 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.737523 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.737583 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.737642 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.737700 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.737760 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.737818 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.737880 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.737939 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.737999 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.738057 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.738116 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.738176 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.738235 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.738295 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.738353 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.738416 kernel: pci 0002:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.738476 kernel: pci 0002:00:01.0: bridge window [mem 0x00800000-0x009fffff] Apr 12 20:48:31.738537 kernel: pci 0002:00:01.0: bridge window [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 20:48:31.738596 kernel: pci 0002:00:03.0: PCI bridge to [bus 02] Apr 12 20:48:31.738654 kernel: pci 0002:00:03.0: bridge window [mem 0x00a00000-0x00bfffff] Apr 12 20:48:31.738714 kernel: pci 0002:00:03.0: bridge window [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 20:48:31.738774 kernel: pci 0002:00:05.0: PCI bridge to [bus 03] Apr 12 20:48:31.738834 kernel: pci 0002:00:05.0: bridge window [mem 0x00c00000-0x00dfffff] Apr 12 20:48:31.738894 kernel: pci 0002:00:05.0: bridge window [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 20:48:31.738954 kernel: pci 0002:00:07.0: PCI bridge to [bus 04] Apr 12 20:48:31.739012 kernel: pci 0002:00:07.0: bridge window [mem 0x00e00000-0x00ffffff] Apr 12 20:48:31.739073 kernel: pci 0002:00:07.0: bridge window [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 20:48:31.739129 kernel: pci_bus 0002:00: resource 4 [mem 0x00800000-0x0fffffff window] Apr 12 20:48:31.739182 kernel: pci_bus 0002:00: resource 5 [mem 0x200000000000-0x23ffdfffffff window] Apr 12 20:48:31.739248 kernel: pci_bus 0002:01: resource 1 [mem 0x00800000-0x009fffff] Apr 12 20:48:31.739307 kernel: pci_bus 0002:01: resource 2 [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 20:48:31.739372 kernel: pci_bus 0002:02: resource 1 [mem 0x00a00000-0x00bfffff] Apr 12 20:48:31.739428 kernel: pci_bus 0002:02: resource 2 [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 20:48:31.739503 kernel: pci_bus 0002:03: resource 1 [mem 0x00c00000-0x00dfffff] Apr 12 20:48:31.739563 kernel: pci_bus 0002:03: resource 2 [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 20:48:31.739626 kernel: pci_bus 0002:04: resource 1 [mem 0x00e00000-0x00ffffff] Apr 12 20:48:31.739683 kernel: pci_bus 0002:04: resource 2 [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 20:48:31.739693 kernel: ACPI: PCI Root Bridge [PCI2] (domain 0001 [bus 00-ff]) Apr 12 20:48:31.739757 kernel: acpi PNP0A08:06: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.739817 kernel: acpi PNP0A08:06: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.739876 kernel: acpi PNP0A08:06: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.739934 kernel: acpi PNP0A08:06: MCFG quirk: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.739992 kernel: acpi PNP0A08:06: ECAM area [mem 0x3bfff0000000-0x3bffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.740050 kernel: acpi PNP0A08:06: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] Apr 12 20:48:31.740060 kernel: PCI host bridge to bus 0001:00 Apr 12 20:48:31.740121 kernel: pci_bus 0001:00: root bus resource [mem 0x60000000-0x6fffffff window] Apr 12 20:48:31.740177 kernel: pci_bus 0001:00: root bus resource [mem 0x380000000000-0x3bffdfffffff window] Apr 12 20:48:31.740231 kernel: pci_bus 0001:00: root bus resource [bus 00-ff] Apr 12 20:48:31.740298 kernel: pci 0001:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 20:48:31.740367 kernel: pci 0001:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 20:48:31.740427 kernel: pci 0001:00:01.0: enabling Extended Tags Apr 12 20:48:31.740491 kernel: pci 0001:00:01.0: supports D1 D2 Apr 12 20:48:31.740551 kernel: pci 0001:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.740619 kernel: pci 0001:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 20:48:31.740680 kernel: pci 0001:00:02.0: supports D1 D2 Apr 12 20:48:31.740740 kernel: pci 0001:00:02.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.740808 kernel: pci 0001:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 20:48:31.740868 kernel: pci 0001:00:03.0: supports D1 D2 Apr 12 20:48:31.740928 kernel: pci 0001:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.740994 kernel: pci 0001:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 20:48:31.741057 kernel: pci 0001:00:04.0: supports D1 D2 Apr 12 20:48:31.741117 kernel: pci 0001:00:04.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.741126 kernel: acpiphp: Slot [1-6] registered Apr 12 20:48:31.741195 kernel: pci 0001:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 20:48:31.741259 kernel: pci 0001:01:00.0: reg 0x10: [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 20:48:31.741320 kernel: pci 0001:01:00.0: reg 0x30: [mem 0x60100000-0x601fffff pref] Apr 12 20:48:31.741383 kernel: pci 0001:01:00.0: PME# supported from D3cold Apr 12 20:48:31.741448 kernel: pci 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 20:48:31.741522 kernel: pci 0001:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 20:48:31.741585 kernel: pci 0001:01:00.1: reg 0x10: [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 20:48:31.741649 kernel: pci 0001:01:00.1: reg 0x30: [mem 0x60000000-0x600fffff pref] Apr 12 20:48:31.741711 kernel: pci 0001:01:00.1: PME# supported from D3cold Apr 12 20:48:31.741720 kernel: acpiphp: Slot [2-6] registered Apr 12 20:48:31.741728 kernel: acpiphp: Slot [3-4] registered Apr 12 20:48:31.741735 kernel: acpiphp: Slot [4-4] registered Apr 12 20:48:31.741791 kernel: pci_bus 0001:00: on NUMA node 0 Apr 12 20:48:31.741850 kernel: pci 0001:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 20:48:31.741910 kernel: pci 0001:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 20:48:31.741971 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.742031 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 20:48:31.742092 kernel: pci 0001:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.742151 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.742212 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.742273 kernel: pci 0001:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.742332 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.742391 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.742450 kernel: pci 0001:00:01.0: BAR 15: assigned [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 20:48:31.742514 kernel: pci 0001:00:01.0: BAR 14: assigned [mem 0x60000000-0x601fffff] Apr 12 20:48:31.742573 kernel: pci 0001:00:02.0: BAR 14: assigned [mem 0x60200000-0x603fffff] Apr 12 20:48:31.742634 kernel: pci 0001:00:02.0: BAR 15: assigned [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 20:48:31.742693 kernel: pci 0001:00:03.0: BAR 14: assigned [mem 0x60400000-0x605fffff] Apr 12 20:48:31.742758 kernel: pci 0001:00:03.0: BAR 15: assigned [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 20:48:31.742817 kernel: pci 0001:00:04.0: BAR 14: assigned [mem 0x60600000-0x607fffff] Apr 12 20:48:31.742876 kernel: pci 0001:00:04.0: BAR 15: assigned [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 20:48:31.742936 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.742996 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743056 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743117 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743176 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743235 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743296 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743354 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743413 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743475 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743534 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743596 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743655 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743715 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743774 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.743832 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.743896 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 20:48:31.743959 kernel: pci 0001:01:00.1: BAR 0: assigned [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 20:48:31.744021 kernel: pci 0001:01:00.0: BAR 6: assigned [mem 0x60000000-0x600fffff pref] Apr 12 20:48:31.744083 kernel: pci 0001:01:00.1: BAR 6: assigned [mem 0x60100000-0x601fffff pref] Apr 12 20:48:31.744145 kernel: pci 0001:00:01.0: PCI bridge to [bus 01] Apr 12 20:48:31.744203 kernel: pci 0001:00:01.0: bridge window [mem 0x60000000-0x601fffff] Apr 12 20:48:31.744262 kernel: pci 0001:00:01.0: bridge window [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 20:48:31.744322 kernel: pci 0001:00:02.0: PCI bridge to [bus 02] Apr 12 20:48:31.744381 kernel: pci 0001:00:02.0: bridge window [mem 0x60200000-0x603fffff] Apr 12 20:48:31.744441 kernel: pci 0001:00:02.0: bridge window [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 20:48:31.744506 kernel: pci 0001:00:03.0: PCI bridge to [bus 03] Apr 12 20:48:31.744566 kernel: pci 0001:00:03.0: bridge window [mem 0x60400000-0x605fffff] Apr 12 20:48:31.744625 kernel: pci 0001:00:03.0: bridge window [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 20:48:31.744685 kernel: pci 0001:00:04.0: PCI bridge to [bus 04] Apr 12 20:48:31.744743 kernel: pci 0001:00:04.0: bridge window [mem 0x60600000-0x607fffff] Apr 12 20:48:31.744803 kernel: pci 0001:00:04.0: bridge window [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 20:48:31.744858 kernel: pci_bus 0001:00: resource 4 [mem 0x60000000-0x6fffffff window] Apr 12 20:48:31.744911 kernel: pci_bus 0001:00: resource 5 [mem 0x380000000000-0x3bffdfffffff window] Apr 12 20:48:31.744983 kernel: pci_bus 0001:01: resource 1 [mem 0x60000000-0x601fffff] Apr 12 20:48:31.745039 kernel: pci_bus 0001:01: resource 2 [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 20:48:31.745103 kernel: pci_bus 0001:02: resource 1 [mem 0x60200000-0x603fffff] Apr 12 20:48:31.745160 kernel: pci_bus 0001:02: resource 2 [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 20:48:31.745227 kernel: pci_bus 0001:03: resource 1 [mem 0x60400000-0x605fffff] Apr 12 20:48:31.745283 kernel: pci_bus 0001:03: resource 2 [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 20:48:31.745347 kernel: pci_bus 0001:04: resource 1 [mem 0x60600000-0x607fffff] Apr 12 20:48:31.745404 kernel: pci_bus 0001:04: resource 2 [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 20:48:31.745413 kernel: ACPI: PCI Root Bridge [PCI6] (domain 0004 [bus 00-ff]) Apr 12 20:48:31.745482 kernel: acpi PNP0A08:07: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:48:31.745543 kernel: acpi PNP0A08:07: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 20:48:31.745603 kernel: acpi PNP0A08:07: _OSC: OS now controls [AER PCIeCapability] Apr 12 20:48:31.745662 kernel: acpi PNP0A08:07: MCFG quirk: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 20:48:31.745719 kernel: acpi PNP0A08:07: ECAM area [mem 0x2bfff0000000-0x2bffffffffff] reserved by PNP0C02:00 Apr 12 20:48:31.745778 kernel: acpi PNP0A08:07: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] Apr 12 20:48:31.745788 kernel: PCI host bridge to bus 0004:00 Apr 12 20:48:31.745847 kernel: pci_bus 0004:00: root bus resource [mem 0x20000000-0x2fffffff window] Apr 12 20:48:31.745902 kernel: pci_bus 0004:00: root bus resource [mem 0x280000000000-0x2bffdfffffff window] Apr 12 20:48:31.745957 kernel: pci_bus 0004:00: root bus resource [bus 00-ff] Apr 12 20:48:31.746024 kernel: pci 0004:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 20:48:31.746094 kernel: pci 0004:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 20:48:31.746155 kernel: pci 0004:00:01.0: supports D1 D2 Apr 12 20:48:31.746216 kernel: pci 0004:00:01.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.746282 kernel: pci 0004:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 20:48:31.746347 kernel: pci 0004:00:03.0: supports D1 D2 Apr 12 20:48:31.746407 kernel: pci 0004:00:03.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.746476 kernel: pci 0004:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 20:48:31.746538 kernel: pci 0004:00:05.0: supports D1 D2 Apr 12 20:48:31.746598 kernel: pci 0004:00:05.0: PME# supported from D0 D1 D3hot Apr 12 20:48:31.746669 kernel: pci 0004:01:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 20:48:31.746732 kernel: pci 0004:01:00.0: enabling Extended Tags Apr 12 20:48:31.746796 kernel: pci 0004:01:00.0: supports D1 D2 Apr 12 20:48:31.746858 kernel: pci 0004:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:48:31.746926 kernel: pci_bus 0004:02: extended config space not accessible Apr 12 20:48:31.747007 kernel: pci 0004:02:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 20:48:31.747076 kernel: pci 0004:02:00.0: reg 0x10: [mem 0x20000000-0x21ffffff] Apr 12 20:48:31.747140 kernel: pci 0004:02:00.0: reg 0x14: [mem 0x22000000-0x2201ffff] Apr 12 20:48:31.747205 kernel: pci 0004:02:00.0: reg 0x18: [io 0x0000-0x007f] Apr 12 20:48:31.747271 kernel: pci 0004:02:00.0: BAR 0: assigned to efifb Apr 12 20:48:31.747337 kernel: pci 0004:02:00.0: supports D1 D2 Apr 12 20:48:31.747401 kernel: pci 0004:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:48:31.747485 kernel: pci 0004:03:00.0: [1912:0014] type 00 class 0x0c0330 Apr 12 20:48:31.747550 kernel: pci 0004:03:00.0: reg 0x10: [mem 0x22200000-0x22201fff 64bit] Apr 12 20:48:31.747614 kernel: pci 0004:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:48:31.747669 kernel: pci_bus 0004:00: on NUMA node 0 Apr 12 20:48:31.747731 kernel: pci 0004:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01-02] add_size 200000 add_align 100000 Apr 12 20:48:31.747793 kernel: pci 0004:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 20:48:31.747852 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 20:48:31.747914 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 20:48:31.747974 kernel: pci 0004:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 20:48:31.748035 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.748095 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 20:48:31.748156 kernel: pci 0004:00:01.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 20:48:31.748217 kernel: pci 0004:00:01.0: BAR 15: assigned [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 20:48:31.748276 kernel: pci 0004:00:03.0: BAR 14: assigned [mem 0x23000000-0x231fffff] Apr 12 20:48:31.748337 kernel: pci 0004:00:03.0: BAR 15: assigned [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 20:48:31.748397 kernel: pci 0004:00:05.0: BAR 14: assigned [mem 0x23200000-0x233fffff] Apr 12 20:48:31.748460 kernel: pci 0004:00:05.0: BAR 15: assigned [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 20:48:31.748521 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.748582 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.748645 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.748707 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.748768 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.748828 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.748889 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.748950 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.749011 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.749072 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.749133 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.749194 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.749257 kernel: pci 0004:01:00.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 20:48:31.749321 kernel: pci 0004:01:00.0: BAR 13: no space for [io size 0x1000] Apr 12 20:48:31.749383 kernel: pci 0004:01:00.0: BAR 13: failed to assign [io size 0x1000] Apr 12 20:48:31.749452 kernel: pci 0004:02:00.0: BAR 0: assigned [mem 0x20000000-0x21ffffff] Apr 12 20:48:31.749521 kernel: pci 0004:02:00.0: BAR 1: assigned [mem 0x22000000-0x2201ffff] Apr 12 20:48:31.749588 kernel: pci 0004:02:00.0: BAR 2: no space for [io size 0x0080] Apr 12 20:48:31.749657 kernel: pci 0004:02:00.0: BAR 2: failed to assign [io size 0x0080] Apr 12 20:48:31.749721 kernel: pci 0004:01:00.0: PCI bridge to [bus 02] Apr 12 20:48:31.749785 kernel: pci 0004:01:00.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 20:48:31.749848 kernel: pci 0004:00:01.0: PCI bridge to [bus 01-02] Apr 12 20:48:31.749907 kernel: pci 0004:00:01.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 20:48:31.749967 kernel: pci 0004:00:01.0: bridge window [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 20:48:31.750030 kernel: pci 0004:03:00.0: BAR 0: assigned [mem 0x23000000-0x23001fff 64bit] Apr 12 20:48:31.750091 kernel: pci 0004:00:03.0: PCI bridge to [bus 03] Apr 12 20:48:31.750153 kernel: pci 0004:00:03.0: bridge window [mem 0x23000000-0x231fffff] Apr 12 20:48:31.750214 kernel: pci 0004:00:03.0: bridge window [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 20:48:31.750274 kernel: pci 0004:00:05.0: PCI bridge to [bus 04] Apr 12 20:48:31.750332 kernel: pci 0004:00:05.0: bridge window [mem 0x23200000-0x233fffff] Apr 12 20:48:31.750391 kernel: pci 0004:00:05.0: bridge window [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 20:48:31.750445 kernel: pci_bus 0004:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 20:48:31.750501 kernel: pci_bus 0004:00: resource 4 [mem 0x20000000-0x2fffffff window] Apr 12 20:48:31.750558 kernel: pci_bus 0004:00: resource 5 [mem 0x280000000000-0x2bffdfffffff window] Apr 12 20:48:31.750624 kernel: pci_bus 0004:01: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 20:48:31.750683 kernel: pci_bus 0004:01: resource 2 [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 20:48:31.750744 kernel: pci_bus 0004:02: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 20:48:31.750808 kernel: pci_bus 0004:03: resource 1 [mem 0x23000000-0x231fffff] Apr 12 20:48:31.750864 kernel: pci_bus 0004:03: resource 2 [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 20:48:31.750929 kernel: pci_bus 0004:04: resource 1 [mem 0x23200000-0x233fffff] Apr 12 20:48:31.750986 kernel: pci_bus 0004:04: resource 2 [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 20:48:31.750995 kernel: iommu: Default domain type: Translated Apr 12 20:48:31.751003 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 20:48:31.751066 kernel: pci 0004:02:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none Apr 12 20:48:31.751132 kernel: pci 0004:02:00.0: vgaarb: bridge control possible Apr 12 20:48:31.751196 kernel: pci 0004:02:00.0: vgaarb: setting as boot device (VGA legacy resources not available) Apr 12 20:48:31.751206 kernel: vgaarb: loaded Apr 12 20:48:31.751214 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 20:48:31.751221 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 20:48:31.751229 kernel: PTP clock support registered Apr 12 20:48:31.751236 kernel: Registered efivars operations Apr 12 20:48:31.751243 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 20:48:31.751251 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 20:48:31.751258 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 20:48:31.751267 kernel: pnp: PnP ACPI init Apr 12 20:48:31.751333 kernel: system 00:00: [mem 0x3bfff0000000-0x3bffffffffff window] could not be reserved Apr 12 20:48:31.751388 kernel: system 00:00: [mem 0x3ffff0000000-0x3fffffffffff window] could not be reserved Apr 12 20:48:31.751445 kernel: system 00:00: [mem 0x23fff0000000-0x23ffffffffff window] could not be reserved Apr 12 20:48:31.751503 kernel: system 00:00: [mem 0x27fff0000000-0x27ffffffffff window] could not be reserved Apr 12 20:48:31.751557 kernel: system 00:00: [mem 0x2bfff0000000-0x2bffffffffff window] could not be reserved Apr 12 20:48:31.751611 kernel: system 00:00: [mem 0x2ffff0000000-0x2fffffffffff window] could not be reserved Apr 12 20:48:31.751669 kernel: system 00:00: [mem 0x33fff0000000-0x33ffffffffff window] could not be reserved Apr 12 20:48:31.751724 kernel: system 00:00: [mem 0x37fff0000000-0x37ffffffffff window] could not be reserved Apr 12 20:48:31.751733 kernel: pnp: PnP ACPI: found 1 devices Apr 12 20:48:31.751741 kernel: NET: Registered PF_INET protocol family Apr 12 20:48:31.751748 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:48:31.751756 kernel: tcp_listen_portaddr_hash hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 20:48:31.751763 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 20:48:31.751771 kernel: TCP established hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 20:48:31.751778 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 20:48:31.751787 kernel: TCP: Hash tables configured (established 524288 bind 65536) Apr 12 20:48:31.751794 kernel: UDP hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 20:48:31.751802 kernel: UDP-Lite hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 20:48:31.751809 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 20:48:31.751872 kernel: pci 0001:01:00.0: CLS mismatch (64 != 32), using 64 bytes Apr 12 20:48:31.751881 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 20:48:31.751889 kernel: kvm [1]: IPA Size Limit: 48 bits Apr 12 20:48:31.751896 kernel: kvm [1]: GICv3: no GICV resource entry Apr 12 20:48:31.751905 kernel: kvm [1]: disabling GICv2 emulation Apr 12 20:48:31.751912 kernel: kvm [1]: GIC system register CPU interface enabled Apr 12 20:48:31.751919 kernel: kvm [1]: vgic interrupt IRQ9 Apr 12 20:48:31.751926 kernel: kvm [1]: VHE mode initialized successfully Apr 12 20:48:31.751934 kernel: Initialise system trusted keyrings Apr 12 20:48:31.751941 kernel: workingset: timestamp_bits=39 max_order=26 bucket_order=0 Apr 12 20:48:31.751948 kernel: Key type asymmetric registered Apr 12 20:48:31.751955 kernel: Asymmetric key parser 'x509' registered Apr 12 20:48:31.751962 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 20:48:31.751971 kernel: io scheduler mq-deadline registered Apr 12 20:48:31.751979 kernel: io scheduler kyber registered Apr 12 20:48:31.751987 kernel: io scheduler bfq registered Apr 12 20:48:31.751994 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 20:48:31.752001 kernel: ACPI: button: Power Button [PWRB] Apr 12 20:48:31.752008 kernel: ACPI GTDT: found 1 SBSA generic Watchdog(s). Apr 12 20:48:31.752016 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 20:48:31.752084 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: option mask 0x0 Apr 12 20:48:31.752141 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.752199 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.752255 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.752313 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 128 entries for evtq Apr 12 20:48:31.752369 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 256 entries for priq Apr 12 20:48:31.752431 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: option mask 0x0 Apr 12 20:48:31.752492 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.752549 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.752606 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.752660 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 128 entries for evtq Apr 12 20:48:31.752716 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 256 entries for priq Apr 12 20:48:31.752779 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: option mask 0x0 Apr 12 20:48:31.752835 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.752890 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.752947 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.753003 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 128 entries for evtq Apr 12 20:48:31.753058 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 256 entries for priq Apr 12 20:48:31.753121 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: option mask 0x0 Apr 12 20:48:31.753176 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.753231 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.753287 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.753341 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 128 entries for evtq Apr 12 20:48:31.753397 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 256 entries for priq Apr 12 20:48:31.753470 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: option mask 0x0 Apr 12 20:48:31.753528 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.753583 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.753639 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.753695 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 128 entries for evtq Apr 12 20:48:31.753750 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 256 entries for priq Apr 12 20:48:31.753813 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: option mask 0x0 Apr 12 20:48:31.753868 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.753924 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.753979 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.754034 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 128 entries for evtq Apr 12 20:48:31.754090 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 256 entries for priq Apr 12 20:48:31.754153 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: option mask 0x0 Apr 12 20:48:31.754209 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.754263 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.754318 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.754373 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 128 entries for evtq Apr 12 20:48:31.754432 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 256 entries for priq Apr 12 20:48:31.754497 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: option mask 0x0 Apr 12 20:48:31.754554 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 20:48:31.754609 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 20:48:31.754665 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 262144 entries for cmdq Apr 12 20:48:31.754720 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 128 entries for evtq Apr 12 20:48:31.754776 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 256 entries for priq Apr 12 20:48:31.754786 kernel: thunder_xcv, ver 1.0 Apr 12 20:48:31.754793 kernel: thunder_bgx, ver 1.0 Apr 12 20:48:31.754800 kernel: nicpf, ver 1.0 Apr 12 20:48:31.754807 kernel: nicvf, ver 1.0 Apr 12 20:48:31.754870 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 20:48:31.754926 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T20:48:30 UTC (1712954910) Apr 12 20:48:31.754935 kernel: efifb: probing for efifb Apr 12 20:48:31.754945 kernel: efifb: framebuffer at 0x20000000, using 1876k, total 1875k Apr 12 20:48:31.754953 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Apr 12 20:48:31.754960 kernel: efifb: scrolling: redraw Apr 12 20:48:31.754967 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 20:48:31.754974 kernel: Console: switching to colour frame buffer device 100x37 Apr 12 20:48:31.754982 kernel: fb0: EFI VGA frame buffer device Apr 12 20:48:31.754989 kernel: SMCCC: SOC_ID: ID = jep106:0a16:0001 Revision = 0x000000a1 Apr 12 20:48:31.754996 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 20:48:31.755003 kernel: NET: Registered PF_INET6 protocol family Apr 12 20:48:31.755012 kernel: Segment Routing with IPv6 Apr 12 20:48:31.755019 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 20:48:31.755026 kernel: NET: Registered PF_PACKET protocol family Apr 12 20:48:31.755034 kernel: Key type dns_resolver registered Apr 12 20:48:31.755041 kernel: registered taskstats version 1 Apr 12 20:48:31.755048 kernel: Loading compiled-in X.509 certificates Apr 12 20:48:31.755055 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 20:48:31.755063 kernel: Key type .fscrypt registered Apr 12 20:48:31.755069 kernel: Key type fscrypt-provisioning registered Apr 12 20:48:31.755077 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 20:48:31.755085 kernel: ima: Allocated hash algorithm: sha1 Apr 12 20:48:31.755092 kernel: ima: No architecture policies found Apr 12 20:48:31.755156 kernel: pcieport 000d:00:01.0: Adding to iommu group 0 Apr 12 20:48:31.755216 kernel: pcieport 000d:00:01.0: AER: enabled with IRQ 91 Apr 12 20:48:31.755278 kernel: pcieport 000d:00:02.0: Adding to iommu group 1 Apr 12 20:48:31.755338 kernel: pcieport 000d:00:02.0: AER: enabled with IRQ 91 Apr 12 20:48:31.755399 kernel: pcieport 000d:00:03.0: Adding to iommu group 2 Apr 12 20:48:31.755463 kernel: pcieport 000d:00:03.0: AER: enabled with IRQ 91 Apr 12 20:48:31.755526 kernel: pcieport 000d:00:04.0: Adding to iommu group 3 Apr 12 20:48:31.755587 kernel: pcieport 000d:00:04.0: AER: enabled with IRQ 91 Apr 12 20:48:31.755648 kernel: pcieport 0000:00:01.0: Adding to iommu group 4 Apr 12 20:48:31.755709 kernel: pcieport 0000:00:01.0: AER: enabled with IRQ 92 Apr 12 20:48:31.755770 kernel: pcieport 0000:00:02.0: Adding to iommu group 5 Apr 12 20:48:31.755830 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 92 Apr 12 20:48:31.755890 kernel: pcieport 0000:00:03.0: Adding to iommu group 6 Apr 12 20:48:31.755949 kernel: pcieport 0000:00:03.0: AER: enabled with IRQ 92 Apr 12 20:48:31.756016 kernel: pcieport 0000:00:04.0: Adding to iommu group 7 Apr 12 20:48:31.756075 kernel: pcieport 0000:00:04.0: AER: enabled with IRQ 92 Apr 12 20:48:31.756138 kernel: pcieport 0005:00:01.0: Adding to iommu group 8 Apr 12 20:48:31.756197 kernel: pcieport 0005:00:01.0: AER: enabled with IRQ 93 Apr 12 20:48:31.756259 kernel: pcieport 0005:00:03.0: Adding to iommu group 9 Apr 12 20:48:31.756318 kernel: pcieport 0005:00:03.0: AER: enabled with IRQ 93 Apr 12 20:48:31.756378 kernel: pcieport 0005:00:05.0: Adding to iommu group 10 Apr 12 20:48:31.756439 kernel: pcieport 0005:00:05.0: AER: enabled with IRQ 93 Apr 12 20:48:31.756503 kernel: pcieport 0005:00:07.0: Adding to iommu group 11 Apr 12 20:48:31.756564 kernel: pcieport 0005:00:07.0: AER: enabled with IRQ 93 Apr 12 20:48:31.756625 kernel: pcieport 0003:00:01.0: Adding to iommu group 12 Apr 12 20:48:31.756687 kernel: pcieport 0003:00:01.0: AER: enabled with IRQ 94 Apr 12 20:48:31.756748 kernel: pcieport 0003:00:03.0: Adding to iommu group 13 Apr 12 20:48:31.756807 kernel: pcieport 0003:00:03.0: AER: enabled with IRQ 94 Apr 12 20:48:31.756867 kernel: pcieport 0003:00:05.0: Adding to iommu group 14 Apr 12 20:48:31.756927 kernel: pcieport 0003:00:05.0: AER: enabled with IRQ 94 Apr 12 20:48:31.756990 kernel: pcieport 000c:00:01.0: Adding to iommu group 15 Apr 12 20:48:31.757052 kernel: pcieport 000c:00:01.0: AER: enabled with IRQ 95 Apr 12 20:48:31.757115 kernel: pcieport 000c:00:02.0: Adding to iommu group 16 Apr 12 20:48:31.757174 kernel: pcieport 000c:00:02.0: AER: enabled with IRQ 95 Apr 12 20:48:31.757236 kernel: pcieport 000c:00:03.0: Adding to iommu group 17 Apr 12 20:48:31.757295 kernel: pcieport 000c:00:03.0: AER: enabled with IRQ 95 Apr 12 20:48:31.757355 kernel: pcieport 000c:00:04.0: Adding to iommu group 18 Apr 12 20:48:31.757415 kernel: pcieport 000c:00:04.0: AER: enabled with IRQ 95 Apr 12 20:48:31.757479 kernel: pcieport 0002:00:01.0: Adding to iommu group 19 Apr 12 20:48:31.757542 kernel: pcieport 0002:00:01.0: AER: enabled with IRQ 96 Apr 12 20:48:31.757603 kernel: pcieport 0002:00:03.0: Adding to iommu group 20 Apr 12 20:48:31.757663 kernel: pcieport 0002:00:03.0: AER: enabled with IRQ 96 Apr 12 20:48:31.757723 kernel: pcieport 0002:00:05.0: Adding to iommu group 21 Apr 12 20:48:31.757784 kernel: pcieport 0002:00:05.0: AER: enabled with IRQ 96 Apr 12 20:48:31.757844 kernel: pcieport 0002:00:07.0: Adding to iommu group 22 Apr 12 20:48:31.757903 kernel: pcieport 0002:00:07.0: AER: enabled with IRQ 96 Apr 12 20:48:31.757964 kernel: pcieport 0001:00:01.0: Adding to iommu group 23 Apr 12 20:48:31.758023 kernel: pcieport 0001:00:01.0: AER: enabled with IRQ 97 Apr 12 20:48:31.758086 kernel: pcieport 0001:00:02.0: Adding to iommu group 24 Apr 12 20:48:31.758146 kernel: pcieport 0001:00:02.0: AER: enabled with IRQ 97 Apr 12 20:48:31.758207 kernel: pcieport 0001:00:03.0: Adding to iommu group 25 Apr 12 20:48:31.758266 kernel: pcieport 0001:00:03.0: AER: enabled with IRQ 97 Apr 12 20:48:31.758325 kernel: pcieport 0001:00:04.0: Adding to iommu group 26 Apr 12 20:48:31.758385 kernel: pcieport 0001:00:04.0: AER: enabled with IRQ 97 Apr 12 20:48:31.758446 kernel: pcieport 0004:00:01.0: Adding to iommu group 27 Apr 12 20:48:31.758510 kernel: pcieport 0004:00:01.0: AER: enabled with IRQ 98 Apr 12 20:48:31.758570 kernel: pcieport 0004:00:03.0: Adding to iommu group 28 Apr 12 20:48:31.758630 kernel: pcieport 0004:00:03.0: AER: enabled with IRQ 98 Apr 12 20:48:31.758689 kernel: pcieport 0004:00:05.0: Adding to iommu group 29 Apr 12 20:48:31.758749 kernel: pcieport 0004:00:05.0: AER: enabled with IRQ 98 Apr 12 20:48:31.758812 kernel: pcieport 0004:01:00.0: Adding to iommu group 30 Apr 12 20:48:31.758821 kernel: Freeing unused kernel memory: 36352K Apr 12 20:48:31.758829 kernel: Run /init as init process Apr 12 20:48:31.758838 kernel: with arguments: Apr 12 20:48:31.758846 kernel: /init Apr 12 20:48:31.758853 kernel: with environment: Apr 12 20:48:31.758860 kernel: HOME=/ Apr 12 20:48:31.758867 kernel: TERM=linux Apr 12 20:48:31.758874 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 20:48:31.758884 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:48:31.758893 systemd[1]: Detected architecture arm64. Apr 12 20:48:31.758902 systemd[1]: Running in initrd. Apr 12 20:48:31.758909 systemd[1]: No hostname configured, using default hostname. Apr 12 20:48:31.758917 systemd[1]: Hostname set to . Apr 12 20:48:31.758924 systemd[1]: Initializing machine ID from random generator. Apr 12 20:48:31.758932 systemd[1]: Queued start job for default target initrd.target. Apr 12 20:48:31.758940 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:48:31.758947 systemd[1]: Reached target cryptsetup.target. Apr 12 20:48:31.758955 systemd[1]: Reached target paths.target. Apr 12 20:48:31.758962 systemd[1]: Reached target slices.target. Apr 12 20:48:31.758970 systemd[1]: Reached target swap.target. Apr 12 20:48:31.758978 systemd[1]: Reached target timers.target. Apr 12 20:48:31.758985 systemd[1]: Listening on iscsid.socket. Apr 12 20:48:31.758993 systemd[1]: Listening on iscsiuio.socket. Apr 12 20:48:31.759001 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 20:48:31.759008 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 20:48:31.759016 systemd[1]: Listening on systemd-journald.socket. Apr 12 20:48:31.759024 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:48:31.759032 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:48:31.759039 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:48:31.759047 systemd[1]: Reached target sockets.target. Apr 12 20:48:31.759054 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:48:31.759061 systemd[1]: Finished network-cleanup.service. Apr 12 20:48:31.759069 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 20:48:31.759076 systemd[1]: Starting systemd-journald.service... Apr 12 20:48:31.759084 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:48:31.759092 systemd[1]: Starting systemd-resolved.service... Apr 12 20:48:31.759100 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 20:48:31.759107 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:48:31.759115 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 20:48:31.759126 systemd-journald[834]: Journal started Apr 12 20:48:31.759169 systemd-journald[834]: Runtime Journal (/run/log/journal/0ef3b34d11fb4f5e9fea97f535b0fd62) is 8.0M, max 4.0G, 3.9G free. Apr 12 20:48:31.699258 systemd-modules-load[835]: Inserted module 'overlay' Apr 12 20:48:31.830437 kernel: audit: type=1130 audit(1712954911.765:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.830472 systemd[1]: Started systemd-resolved.service. Apr 12 20:48:31.830493 kernel: Bridge firewalling registered Apr 12 20:48:31.830517 kernel: SCSI subsystem initialized Apr 12 20:48:31.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.746774 systemd-resolved[836]: Positive Trust Anchors: Apr 12 20:48:31.926509 kernel: audit: type=1130 audit(1712954911.834:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.926523 systemd[1]: Started systemd-journald.service. Apr 12 20:48:31.926534 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 20:48:31.926543 kernel: device-mapper: uevent: version 1.0.3 Apr 12 20:48:31.926552 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 20:48:31.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.746781 systemd-resolved[836]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:48:31.974934 kernel: audit: type=1130 audit(1712954911.930:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.746809 systemd-resolved[836]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:48:32.043581 kernel: audit: type=1130 audit(1712954911.979:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.751918 systemd-resolved[836]: Defaulting to hostname 'linux'. Apr 12 20:48:32.088353 kernel: audit: type=1130 audit(1712954912.047:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.768444 systemd-modules-load[835]: Inserted module 'br_netfilter' Apr 12 20:48:32.138732 kernel: audit: type=1130 audit(1712954912.092:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:31.915625 systemd-modules-load[835]: Inserted module 'dm_multipath' Apr 12 20:48:31.931440 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 20:48:31.980024 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:48:32.048635 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 20:48:32.093570 systemd[1]: Reached target nss-lookup.target. Apr 12 20:48:32.144943 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 20:48:32.228345 kernel: audit: type=1130 audit(1712954912.189:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.155804 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:48:32.271335 kernel: audit: type=1130 audit(1712954912.232:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.166640 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:48:32.323838 kernel: audit: type=1130 audit(1712954912.275:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.181914 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 20:48:32.334674 dracut-cmdline[854]: dracut-dracut-053 Apr 12 20:48:32.334674 dracut-cmdline[854]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=t Apr 12 20:48:32.334674 dracut-cmdline[854]: tyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 20:48:32.190403 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:48:32.233072 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:48:32.277625 systemd[1]: Starting dracut-cmdline.service... Apr 12 20:48:32.409468 kernel: Loading iSCSI transport class v2.0-870. Apr 12 20:48:32.430465 kernel: iscsi: registered transport (tcp) Apr 12 20:48:32.461774 kernel: iscsi: registered transport (qla4xxx) Apr 12 20:48:32.461794 kernel: QLogic iSCSI HBA Driver Apr 12 20:48:32.492877 systemd[1]: Finished dracut-cmdline.service. Apr 12 20:48:32.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:32.498926 systemd[1]: Starting dracut-pre-udev.service... Apr 12 20:48:32.554471 kernel: raid6: neonx8 gen() 13864 MB/s Apr 12 20:48:32.579467 kernel: raid6: neonx8 xor() 10873 MB/s Apr 12 20:48:32.604467 kernel: raid6: neonx4 gen() 13614 MB/s Apr 12 20:48:32.629467 kernel: raid6: neonx4 xor() 11357 MB/s Apr 12 20:48:32.654467 kernel: raid6: neonx2 gen() 13155 MB/s Apr 12 20:48:32.679468 kernel: raid6: neonx2 xor() 10653 MB/s Apr 12 20:48:32.704467 kernel: raid6: neonx1 gen() 10609 MB/s Apr 12 20:48:32.728467 kernel: raid6: neonx1 xor() 8841 MB/s Apr 12 20:48:32.752467 kernel: raid6: int64x8 gen() 6287 MB/s Apr 12 20:48:32.776467 kernel: raid6: int64x8 xor() 3557 MB/s Apr 12 20:48:32.800467 kernel: raid6: int64x4 gen() 7309 MB/s Apr 12 20:48:32.824467 kernel: raid6: int64x4 xor() 3863 MB/s Apr 12 20:48:32.848467 kernel: raid6: int64x2 gen() 6174 MB/s Apr 12 20:48:32.872467 kernel: raid6: int64x2 xor() 3332 MB/s Apr 12 20:48:32.896467 kernel: raid6: int64x1 gen() 5065 MB/s Apr 12 20:48:32.927820 kernel: raid6: int64x1 xor() 2656 MB/s Apr 12 20:48:32.927840 kernel: raid6: using algorithm neonx8 gen() 13864 MB/s Apr 12 20:48:32.927858 kernel: raid6: .... xor() 10873 MB/s, rmw enabled Apr 12 20:48:32.935644 kernel: raid6: using neon recovery algorithm Apr 12 20:48:32.968387 kernel: xor: measuring software checksum speed Apr 12 20:48:32.968408 kernel: 8regs : 17315 MB/sec Apr 12 20:48:32.982802 kernel: 32regs : 20755 MB/sec Apr 12 20:48:32.982821 kernel: arm64_neon : 27901 MB/sec Apr 12 20:48:32.982839 kernel: xor: using function: arm64_neon (27901 MB/sec) Apr 12 20:48:33.050466 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 20:48:33.059192 systemd[1]: Finished dracut-pre-udev.service. Apr 12 20:48:33.117952 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 20:48:33.117967 kernel: audit: type=1130 audit(1712954913.061:12): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.117978 kernel: audit: type=1334 audit(1712954913.061:13): prog-id=7 op=LOAD Apr 12 20:48:33.117987 kernel: audit: type=1334 audit(1712954913.062:14): prog-id=8 op=LOAD Apr 12 20:48:33.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.061000 audit: BPF prog-id=7 op=LOAD Apr 12 20:48:33.062000 audit: BPF prog-id=8 op=LOAD Apr 12 20:48:33.063568 systemd[1]: Starting systemd-udevd.service... Apr 12 20:48:33.128955 systemd-udevd[1030]: Using default interface naming scheme 'v252'. Apr 12 20:48:33.132218 systemd[1]: Started systemd-udevd.service. Apr 12 20:48:33.168341 kernel: audit: type=1130 audit(1712954913.135:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.137932 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 20:48:33.175770 dracut-pre-trigger[1038]: rd.md=0: removing MD RAID activation Apr 12 20:48:33.184645 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 20:48:33.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.193158 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:48:33.228452 kernel: audit: type=1130 audit(1712954913.191:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.286070 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:48:33.330067 kernel: audit: type=1130 audit(1712954913.290:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:33.351161 kernel: ACPI: bus type USB registered Apr 12 20:48:33.351175 kernel: mlx5_core 0001:01:00.0: Adding to iommu group 31 Apr 12 20:48:33.351298 kernel: usbcore: registered new interface driver usbfs Apr 12 20:48:33.372413 kernel: mlx5_core 0001:01:00.0: firmware version: 14.30.1004 Apr 12 20:48:33.372491 kernel: usbcore: registered new interface driver hub Apr 12 20:48:33.372501 kernel: mlx5_core 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 20:48:33.378467 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 20:48:33.378487 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 20:48:33.378504 kernel: igb 0003:03:00.0: Adding to iommu group 32 Apr 12 20:48:33.407999 kernel: usbcore: registered new device driver usb Apr 12 20:48:33.439461 kernel: nvme 0005:03:00.0: Adding to iommu group 33 Apr 12 20:48:33.472471 kernel: xhci_hcd 0004:03:00.0: Adding to iommu group 34 Apr 12 20:48:33.472617 kernel: igb 0003:03:00.0: added PHC on eth0 Apr 12 20:48:33.492324 kernel: igb 0003:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:48:33.492454 kernel: igb 0003:03:00.0: eth0: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:80:54:78 Apr 12 20:48:33.513622 kernel: igb 0003:03:00.0: eth0: PBA No: 106300-000 Apr 12 20:48:33.513689 kernel: igb 0003:03:00.0: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 20:48:33.535385 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 20:48:33.535455 kernel: igb 0003:03:00.1: Adding to iommu group 35 Apr 12 20:48:33.535528 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 1 Apr 12 20:48:33.577667 kernel: nvme nvme0: pci function 0005:03:00.0 Apr 12 20:48:33.577767 kernel: xhci_hcd 0004:03:00.0: Zeroing 64bit base registers, expecting fault Apr 12 20:48:33.577835 kernel: nvme 0005:04:00.0: Adding to iommu group 36 Apr 12 20:48:33.588462 kernel: nvme nvme0: Shutdown timeout set to 8 seconds Apr 12 20:48:33.631471 kernel: nvme nvme0: 32/0/0 default/read/poll queues Apr 12 20:48:33.656262 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 20:48:33.656275 kernel: GPT:9289727 != 1875385007 Apr 12 20:48:33.656284 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 20:48:33.667182 kernel: mlx5_core 0001:01:00.0: Port module event: module 0, Cable plugged Apr 12 20:48:33.667334 kernel: GPT:9289727 != 1875385007 Apr 12 20:48:33.697672 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 20:48:33.697694 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 20:48:33.706690 kernel: mlx5_core 0001:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:48:33.751564 kernel: xhci_hcd 0004:03:00.0: hcc params 0x014051cf hci version 0x100 quirks 0x0000001100000410 Apr 12 20:48:33.751716 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 20:48:33.751794 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 2 Apr 12 20:48:33.773961 kernel: xhci_hcd 0004:03:00.0: Host supports USB 3.0 SuperSpeed Apr 12 20:48:33.790800 kernel: hub 1-0:1.0: USB hub found Apr 12 20:48:33.790910 kernel: hub 1-0:1.0: 4 ports detected Apr 12 20:48:33.790986 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Apr 12 20:48:33.822743 kernel: nvme nvme1: pci function 0005:04:00.0 Apr 12 20:48:33.843644 kernel: hub 2-0:1.0: USB hub found Apr 12 20:48:33.843745 kernel: nvme nvme1: Shutdown timeout set to 8 seconds Apr 12 20:48:33.843813 kernel: hub 2-0:1.0: 4 ports detected Apr 12 20:48:33.863264 kernel: igb 0003:03:00.1: added PHC on eth1 Apr 12 20:48:33.863412 kernel: igb 0003:03:00.1: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:48:33.874359 kernel: nvme nvme1: 32/0/0 default/read/poll queues Apr 12 20:48:33.883835 kernel: igb 0003:03:00.1: eth1: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:80:54:79 Apr 12 20:48:33.906828 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 20:48:33.963470 kernel: igb 0003:03:00.1: eth1: PBA No: 106300-000 Apr 12 20:48:33.963567 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by (udev-worker) (1084) Apr 12 20:48:33.963578 kernel: igb 0003:03:00.1: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 20:48:33.963643 kernel: igb 0003:03:00.1 eno2: renamed from eth1 Apr 12 20:48:33.963711 kernel: igb 0003:03:00.0 eno1: renamed from eth0 Apr 12 20:48:33.952595 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 20:48:33.970891 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 20:48:33.977552 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 20:48:33.997426 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:48:34.009076 systemd[1]: Starting disk-uuid.service... Apr 12 20:48:34.015720 disk-uuid[1131]: Primary Header is updated. Apr 12 20:48:34.015720 disk-uuid[1131]: Secondary Entries is updated. Apr 12 20:48:34.015720 disk-uuid[1131]: Secondary Header is updated. Apr 12 20:48:34.041254 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 20:48:34.169471 kernel: usb 1-3: new high-speed USB device number 2 using xhci_hcd Apr 12 20:48:34.211471 kernel: mlx5_core 0001:01:00.1: Adding to iommu group 37 Apr 12 20:48:34.211646 kernel: mlx5_core 0001:01:00.1: firmware version: 14.30.1004 Apr 12 20:48:34.246060 kernel: mlx5_core 0001:01:00.1: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 20:48:34.336412 kernel: hub 1-3:1.0: USB hub found Apr 12 20:48:34.336602 kernel: hub 1-3:1.0: 4 ports detected Apr 12 20:48:34.438469 kernel: usb 2-3: new SuperSpeed USB device number 2 using xhci_hcd Apr 12 20:48:34.466469 kernel: hub 2-3:1.0: USB hub found Apr 12 20:48:34.475461 kernel: hub 2-3:1.0: 4 ports detected Apr 12 20:48:34.519924 kernel: mlx5_core 0001:01:00.1: Port module event: module 1, Cable plugged Apr 12 20:48:34.562471 kernel: mlx5_core 0001:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:48:34.862468 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: renamed from eth1 Apr 12 20:48:34.879463 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: renamed from eth0 Apr 12 20:48:35.037123 disk-uuid[1132]: The operation has completed successfully. Apr 12 20:48:35.041866 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 20:48:35.060423 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 20:48:35.145305 kernel: audit: type=1130 audit(1712954915.064:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.145329 kernel: audit: type=1131 audit(1712954915.064:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.145351 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 20:48:35.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.060525 systemd[1]: Finished disk-uuid.service. Apr 12 20:48:35.071960 systemd[1]: Starting verity-setup.service... Apr 12 20:48:35.161082 systemd[1]: Found device dev-mapper-usr.device. Apr 12 20:48:35.170793 systemd[1]: Mounting sysusr-usr.mount... Apr 12 20:48:35.179774 systemd[1]: Finished verity-setup.service. Apr 12 20:48:35.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.237466 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 20:48:35.237886 systemd[1]: Mounted sysusr-usr.mount. Apr 12 20:48:35.242462 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 20:48:35.311827 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 20:48:35.311840 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 20:48:35.311850 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 20:48:35.311859 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 20:48:35.243633 systemd[1]: Starting ignition-setup.service... Apr 12 20:48:35.252910 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 20:48:35.327016 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 20:48:35.332955 systemd[1]: Finished ignition-setup.service. Apr 12 20:48:35.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.343497 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 20:48:35.362330 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 20:48:35.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.367000 audit: BPF prog-id=9 op=LOAD Apr 12 20:48:35.368858 systemd[1]: Starting systemd-networkd.service... Apr 12 20:48:35.393863 systemd-networkd[1489]: lo: Link UP Apr 12 20:48:35.393869 systemd-networkd[1489]: lo: Gained carrier Apr 12 20:48:35.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.394340 systemd-networkd[1489]: Enumeration completed Apr 12 20:48:35.394408 systemd[1]: Started systemd-networkd.service. Apr 12 20:48:35.395066 systemd-networkd[1489]: enP1p1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:48:35.402470 systemd[1]: Reached target network.target. Apr 12 20:48:35.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.411738 systemd[1]: Starting iscsiuio.service... Apr 12 20:48:35.433019 ignition[1464]: Ignition 2.14.0 Apr 12 20:48:35.452429 iscsid[1505]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:48:35.452429 iscsid[1505]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 20:48:35.452429 iscsid[1505]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 20:48:35.452429 iscsid[1505]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 20:48:35.452429 iscsid[1505]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 20:48:35.452429 iscsid[1505]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:48:35.452429 iscsid[1505]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 20:48:35.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.426010 systemd[1]: Started iscsiuio.service. Apr 12 20:48:35.433027 ignition[1464]: Stage: fetch-offline Apr 12 20:48:35.437275 systemd[1]: Starting iscsid.service... Apr 12 20:48:35.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:35.433100 ignition[1464]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:48:35.450620 systemd[1]: Started iscsid.service. Apr 12 20:48:35.433119 ignition[1464]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:48:35.458142 systemd[1]: Starting dracut-initqueue.service... Apr 12 20:48:35.437676 ignition[1464]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:48:35.472421 unknown[1464]: fetched base config from "system" Apr 12 20:48:35.437783 ignition[1464]: parsed url from cmdline: "" Apr 12 20:48:35.472427 unknown[1464]: fetched user config from "system" Apr 12 20:48:35.437787 ignition[1464]: no config URL provided Apr 12 20:48:35.474515 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 20:48:35.437792 ignition[1464]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 20:48:35.487530 systemd[1]: Finished dracut-initqueue.service. Apr 12 20:48:35.437861 ignition[1464]: parsing config with SHA512: 51a3e84263dfb451317af6cd2ebc763ea25ca2bd01d0bcaa23783361c16aa23c2b9a0e9d858267c13dce2794b8c18d59f8bfd94faaba620169688250c3fba56e Apr 12 20:48:35.505112 systemd[1]: Reached target remote-fs-pre.target. Apr 12 20:48:35.473005 ignition[1464]: fetch-offline: fetch-offline passed Apr 12 20:48:35.514105 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:48:35.473009 ignition[1464]: POST message to Packet Timeline Apr 12 20:48:35.523524 systemd[1]: Reached target remote-fs.target. Apr 12 20:48:35.473014 ignition[1464]: POST Status error: resource requires networking Apr 12 20:48:35.539334 systemd[1]: Starting dracut-pre-mount.service... Apr 12 20:48:35.473068 ignition[1464]: Ignition finished successfully Apr 12 20:48:35.553684 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 20:48:35.570748 ignition[1536]: Ignition 2.14.0 Apr 12 20:48:35.555188 systemd[1]: Starting ignition-kargs.service... Apr 12 20:48:35.570754 ignition[1536]: Stage: kargs Apr 12 20:48:35.564705 systemd[1]: Finished dracut-pre-mount.service. Apr 12 20:48:35.570865 ignition[1536]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:48:35.570882 ignition[1536]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:48:35.573008 ignition[1536]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:48:35.574140 ignition[1536]: kargs: kargs passed Apr 12 20:48:35.574145 ignition[1536]: POST message to Packet Timeline Apr 12 20:48:35.574160 ignition[1536]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:48:35.577133 ignition[1536]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41307->[::1]:53: read: connection refused Apr 12 20:48:35.777770 ignition[1536]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 20:48:35.778243 ignition[1536]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56918->[::1]:53: read: connection refused Apr 12 20:48:36.105472 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 20:48:36.110903 systemd-networkd[1489]: enP1p1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:48:36.128931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f1np1: link becomes ready Apr 12 20:48:36.178591 ignition[1536]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 20:48:36.179314 ignition[1536]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:54741->[::1]:53: read: connection refused Apr 12 20:48:36.852472 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 20:48:36.855356 systemd-networkd[1489]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:48:36.907451 systemd-networkd[1489]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:48:36.961126 systemd-networkd[1489]: enP1p1s0f1np1: Link UP Apr 12 20:48:36.961268 systemd-networkd[1489]: enP1p1s0f1np1: Gained carrier Apr 12 20:48:36.970580 systemd-networkd[1489]: enP1p1s0f0np0: Link UP Apr 12 20:48:36.970693 systemd-networkd[1489]: eno2: Link UP Apr 12 20:48:36.970798 systemd-networkd[1489]: eno1: Link UP Apr 12 20:48:36.979445 ignition[1536]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 20:48:36.980047 ignition[1536]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43069->[::1]:53: read: connection refused Apr 12 20:48:37.127471 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f0np0: link becomes ready Apr 12 20:48:37.127598 systemd-networkd[1489]: enP1p1s0f0np0: Gained carrier Apr 12 20:48:37.162509 systemd-networkd[1489]: enP1p1s0f0np0: DHCPv4 address 147.28.150.175/31, gateway 147.28.150.174 acquired from 147.28.144.140 Apr 12 20:48:38.019715 systemd-networkd[1489]: enP1p1s0f1np1: Gained IPv6LL Apr 12 20:48:38.403702 systemd-networkd[1489]: enP1p1s0f0np0: Gained IPv6LL Apr 12 20:48:38.580926 ignition[1536]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 20:48:38.581555 ignition[1536]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39181->[::1]:53: read: connection refused Apr 12 20:48:41.784605 ignition[1536]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 20:48:41.815810 ignition[1536]: GET result: OK Apr 12 20:48:41.947433 ignition[1536]: Ignition finished successfully Apr 12 20:48:41.998067 kernel: kauditd_printk_skb: 10 callbacks suppressed Apr 12 20:48:41.998102 kernel: audit: type=1130 audit(1712954921.952:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:41.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:41.964714 ignition[1553]: Ignition 2.14.0 Apr 12 20:48:41.949493 systemd[1]: Finished ignition-kargs.service. Apr 12 20:48:41.964721 ignition[1553]: Stage: disks Apr 12 20:48:41.954542 systemd[1]: Starting ignition-disks.service... Apr 12 20:48:41.964836 ignition[1553]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:48:41.964870 ignition[1553]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:48:41.967159 ignition[1553]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:48:41.968329 ignition[1553]: disks: disks passed Apr 12 20:48:41.968334 ignition[1553]: POST message to Packet Timeline Apr 12 20:48:41.968349 ignition[1553]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:48:42.025589 ignition[1553]: GET result: OK Apr 12 20:48:42.194565 ignition[1553]: Ignition finished successfully Apr 12 20:48:42.196456 systemd[1]: Finished ignition-disks.service. Apr 12 20:48:42.241438 kernel: audit: type=1130 audit(1712954922.203:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.203675 systemd[1]: Reached target initrd-root-device.target. Apr 12 20:48:42.246263 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:48:42.255577 systemd[1]: Reached target local-fs.target. Apr 12 20:48:42.264807 systemd[1]: Reached target sysinit.target. Apr 12 20:48:42.273920 systemd[1]: Reached target basic.target. Apr 12 20:48:42.284362 systemd[1]: Starting systemd-fsck-root.service... Apr 12 20:48:42.301281 systemd-fsck[1572]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 20:48:42.303538 systemd[1]: Finished systemd-fsck-root.service. Apr 12 20:48:42.367153 kernel: audit: type=1130 audit(1712954922.310:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.367181 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 20:48:42.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.313629 systemd[1]: Mounting sysroot.mount... Apr 12 20:48:42.373503 systemd[1]: Mounted sysroot.mount. Apr 12 20:48:42.381086 systemd[1]: Reached target initrd-root-fs.target. Apr 12 20:48:42.391389 systemd[1]: Mounting sysroot-usr.mount... Apr 12 20:48:42.400929 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 20:48:42.411214 systemd[1]: Starting flatcar-static-network.service... Apr 12 20:48:42.419447 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 20:48:42.419511 systemd[1]: Reached target ignition-diskful.target. Apr 12 20:48:42.431555 systemd[1]: Mounted sysroot-usr.mount. Apr 12 20:48:42.521147 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/nvme0n1p6 scanned by mount (1585) Apr 12 20:48:42.521164 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 20:48:42.521177 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 20:48:42.521187 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 20:48:42.521196 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 20:48:42.521219 coreos-metadata[1580]: Apr 12 20:48:42.478 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:48:42.521219 coreos-metadata[1580]: Apr 12 20:48:42.513 INFO Fetch successful Apr 12 20:48:42.545186 coreos-metadata[1579]: Apr 12 20:48:42.478 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:48:42.545186 coreos-metadata[1579]: Apr 12 20:48:42.500 INFO Fetch successful Apr 12 20:48:42.545186 coreos-metadata[1579]: Apr 12 20:48:42.532 INFO wrote hostname ci-3510.3.3-a-aaaf4a72a0 to /sysroot/etc/hostname Apr 12 20:48:42.729597 kernel: audit: type=1130 audit(1712954922.549:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.729614 kernel: audit: type=1130 audit(1712954922.597:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.729624 kernel: audit: type=1131 audit(1712954922.597:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.729637 kernel: audit: type=1130 audit(1712954922.682:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.445304 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:48:42.453963 systemd[1]: Starting initrd-setup-root.service... Apr 12 20:48:42.528287 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:48:42.756633 initrd-setup-root[1590]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 20:48:42.540782 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 20:48:42.807739 kernel: audit: type=1130 audit(1712954922.766:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.807884 initrd-setup-root[1598]: cut: /sysroot/etc/group: No such file or directory Apr 12 20:48:42.550233 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 20:48:42.818599 ignition[1656]: INFO : Ignition 2.14.0 Apr 12 20:48:42.818599 ignition[1656]: INFO : Stage: mount Apr 12 20:48:42.818599 ignition[1656]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:48:42.818599 ignition[1656]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:48:42.818599 ignition[1656]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:48:42.818599 ignition[1656]: INFO : mount: mount passed Apr 12 20:48:42.818599 ignition[1656]: INFO : POST message to Packet Timeline Apr 12 20:48:42.818599 ignition[1656]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:48:42.818599 ignition[1656]: INFO : GET result: OK Apr 12 20:48:42.880479 initrd-setup-root[1606]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 20:48:42.550300 systemd[1]: Finished flatcar-static-network.service. Apr 12 20:48:42.890449 initrd-setup-root[1630]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 20:48:42.598428 systemd[1]: Finished initrd-setup-root.service. Apr 12 20:48:42.684350 systemd[1]: Starting ignition-mount.service... Apr 12 20:48:42.736113 systemd[1]: Starting sysroot-boot.service... Apr 12 20:48:42.746829 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 20:48:42.958608 kernel: audit: type=1130 audit(1712954922.914:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:48:42.958656 ignition[1656]: INFO : Ignition finished successfully Apr 12 20:48:42.746983 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 20:48:43.036899 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/nvme0n1p6 scanned by mount (1674) Apr 12 20:48:43.036911 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 20:48:43.036921 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 20:48:43.036933 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 20:48:43.036942 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 20:48:42.762128 systemd[1]: Finished sysroot-boot.service. Apr 12 20:48:42.906770 systemd[1]: Finished ignition-mount.service. Apr 12 20:48:42.916269 systemd[1]: Starting ignition-files.service... Apr 12 20:48:43.055545 ignition[1693]: INFO : Ignition 2.14.0 Apr 12 20:48:43.055545 ignition[1693]: INFO : Stage: files Apr 12 20:48:43.055545 ignition[1693]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:48:43.055545 ignition[1693]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:48:42.967782 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:48:43.086004 ignition[1693]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:48:43.086004 ignition[1693]: DEBUG : files: compiled without relabeling support, skipping Apr 12 20:48:43.086004 ignition[1693]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 20:48:43.086004 ignition[1693]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 20:48:43.086004 ignition[1693]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 20:48:43.086004 ignition[1693]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 20:48:43.086004 ignition[1693]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 20:48:43.086004 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 20:48:43.086004 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 20:48:42.978661 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:48:43.061710 unknown[1693]: wrote ssh authorized keys file for user: core Apr 12 20:48:43.403825 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 20:48:43.508218 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 20:48:43.518510 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 20:48:43.518510 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 20:48:43.659000 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 20:48:43.902108 ignition[1693]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 20:48:43.920023 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 20:48:43.920023 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 20:48:43.920023 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 20:48:43.962002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 20:48:44.089722 ignition[1693]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 20:48:44.107895 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 20:48:44.107895 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 20:48:44.107895 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 20:48:44.482673 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 20:48:48.322732 ignition[1693]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 20:48:48.341571 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 20:48:48.341571 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 20:48:48.341571 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 20:48:48.484808 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 20:48:57.904003 ignition[1693]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 20:48:57.922954 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 20:48:57.922954 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 20:48:57.922954 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Apr 12 20:48:58.042742 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 20:49:02.565437 ignition[1693]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:49:02.584525 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 20:49:02.839924 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1697) Apr 12 20:49:02.839946 kernel: audit: type=1130 audit(1712954942.769:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.840002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2105556014" Apr 12 20:49:02.840002 ignition[1693]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2105556014": device or resource busy Apr 12 20:49:02.840002 ignition[1693]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2105556014", trying btrfs: device or resource busy Apr 12 20:49:02.840002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2105556014" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2105556014" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2105556014" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2105556014" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Apr 12 20:49:02.840002 ignition[1693]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Apr 12 20:49:03.392303 kernel: audit: type=1130 audit(1712954942.864:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.392322 kernel: audit: type=1130 audit(1712954942.926:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.392336 kernel: audit: type=1131 audit(1712954942.926:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.392346 kernel: audit: type=1130 audit(1712954943.071:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.392356 kernel: audit: type=1131 audit(1712954943.071:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.392365 kernel: audit: type=1130 audit(1712954943.211:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.392375 kernel: audit: type=1131 audit(1712954943.329:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.761937 systemd[1]: Finished ignition-files.service. Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1c): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1c): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:49:03.403069 ignition[1693]: INFO : files: files passed Apr 12 20:49:03.806011 kernel: audit: type=1131 audit(1712954943.557:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.806030 kernel: audit: type=1131 audit(1712954943.627:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.772601 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 20:49:03.817226 ignition[1693]: INFO : POST message to Packet Timeline Apr 12 20:49:03.817226 ignition[1693]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:49:03.817226 ignition[1693]: INFO : GET result: OK Apr 12 20:49:03.817226 ignition[1693]: INFO : Ignition finished successfully Apr 12 20:49:03.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.827534 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 20:49:03.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.876151 iscsid[1505]: iscsid shutting down. Apr 12 20:49:03.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.886841 initrd-setup-root-after-ignition[1733]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 20:49:02.829032 systemd[1]: Starting ignition-quench.service... Apr 12 20:49:02.846689 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 20:49:03.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.864785 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 20:49:03.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:02.864859 systemd[1]: Finished ignition-quench.service. Apr 12 20:49:02.927585 systemd[1]: Reached target ignition-complete.target. Apr 12 20:49:03.026094 systemd[1]: Starting initrd-parse-etc.service... Apr 12 20:49:03.056046 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 20:49:03.974900 ignition[1748]: INFO : Ignition 2.14.0 Apr 12 20:49:03.974900 ignition[1748]: INFO : Stage: umount Apr 12 20:49:03.974900 ignition[1748]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:49:03.974900 ignition[1748]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:49:03.974900 ignition[1748]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:49:03.974900 ignition[1748]: INFO : umount: umount passed Apr 12 20:49:03.974900 ignition[1748]: INFO : POST message to Packet Timeline Apr 12 20:49:03.974900 ignition[1748]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:49:03.974900 ignition[1748]: INFO : GET result: OK Apr 12 20:49:03.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.076000 audit: BPF prog-id=6 op=UNLOAD Apr 12 20:49:03.056265 systemd[1]: Finished initrd-parse-etc.service. Apr 12 20:49:04.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.086395 ignition[1748]: INFO : Ignition finished successfully Apr 12 20:49:04.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.071756 systemd[1]: Reached target initrd-fs.target. Apr 12 20:49:04.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.161324 systemd[1]: Reached target initrd.target. Apr 12 20:49:03.177875 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 20:49:04.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.179433 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 20:49:03.200178 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 20:49:03.213863 systemd[1]: Starting initrd-cleanup.service... Apr 12 20:49:04.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.271905 systemd[1]: Stopped target nss-lookup.target. Apr 12 20:49:04.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.281584 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 20:49:04.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.297652 systemd[1]: Stopped target timers.target. Apr 12 20:49:03.313717 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 20:49:04.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.313804 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 20:49:04.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.330013 systemd[1]: Stopped target initrd.target. Apr 12 20:49:04.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.381781 systemd[1]: Stopped target basic.target. Apr 12 20:49:04.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:03.397760 systemd[1]: Stopped target ignition-complete.target. Apr 12 20:49:03.408352 systemd[1]: Stopped target ignition-diskful.target. Apr 12 20:49:03.424515 systemd[1]: Stopped target initrd-root-device.target. Apr 12 20:49:03.441287 systemd[1]: Stopped target remote-fs.target. Apr 12 20:49:03.457425 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 20:49:03.473566 systemd[1]: Stopped target sysinit.target. Apr 12 20:49:03.489961 systemd[1]: Stopped target local-fs.target. Apr 12 20:49:03.506584 systemd[1]: Stopped target local-fs-pre.target. Apr 12 20:49:03.524484 systemd[1]: Stopped target swap.target. Apr 12 20:49:03.541918 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 20:49:03.542000 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 20:49:03.558405 systemd[1]: Stopped target cryptsetup.target. Apr 12 20:49:03.611058 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 20:49:03.611137 systemd[1]: Stopped dracut-initqueue.service. Apr 12 20:49:03.628244 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 20:49:03.628320 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 20:49:03.681368 systemd[1]: Stopped target paths.target. Apr 12 20:49:03.698636 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 20:49:03.702478 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 20:49:03.718403 systemd[1]: Stopped target slices.target. Apr 12 20:49:03.735397 systemd[1]: Stopped target sockets.target. Apr 12 20:49:03.751423 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 20:49:03.751513 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 20:49:03.767401 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 20:49:03.767480 systemd[1]: Stopped ignition-files.service. Apr 12 20:49:03.783742 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 20:49:03.783818 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 20:49:03.802119 systemd[1]: Stopping ignition-mount.service... Apr 12 20:49:03.812007 systemd[1]: Stopping iscsid.service... Apr 12 20:49:03.824389 systemd[1]: Stopping sysroot-boot.service... Apr 12 20:49:03.833749 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 20:49:03.833957 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 20:49:03.844702 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 20:49:03.844796 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 20:49:03.858059 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 20:49:03.858763 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 20:49:03.858918 systemd[1]: Stopped iscsid.service. Apr 12 20:49:03.865930 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 20:49:03.866034 systemd[1]: Stopped sysroot-boot.service. Apr 12 20:49:03.881929 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 20:49:03.881992 systemd[1]: Closed iscsid.socket. Apr 12 20:49:03.892219 systemd[1]: Stopping iscsiuio.service... Apr 12 20:49:03.908576 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 20:49:03.908681 systemd[1]: Stopped iscsiuio.service. Apr 12 20:49:03.919075 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 20:49:03.919152 systemd[1]: Finished initrd-cleanup.service. Apr 12 20:49:03.930357 systemd[1]: Stopped target network.target. Apr 12 20:49:03.939748 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 20:49:03.939807 systemd[1]: Closed iscsiuio.socket. Apr 12 20:49:03.950302 systemd[1]: Stopping systemd-networkd.service... Apr 12 20:49:03.958485 systemd-networkd[1489]: enP1p1s0f0np0: DHCPv6 lease lost Apr 12 20:49:03.960191 systemd[1]: Stopping systemd-resolved.service... Apr 12 20:49:03.969564 systemd-networkd[1489]: enP1p1s0f1np1: DHCPv6 lease lost Apr 12 20:49:04.417000 audit: BPF prog-id=9 op=UNLOAD Apr 12 20:49:03.970089 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 20:49:03.970176 systemd[1]: Stopped systemd-resolved.service. Apr 12 20:49:03.980361 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 20:49:03.980466 systemd[1]: Stopped systemd-networkd.service. Apr 12 20:49:03.989705 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 20:49:03.989769 systemd[1]: Stopped ignition-mount.service. Apr 12 20:49:03.998959 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 20:49:03.998983 systemd[1]: Closed systemd-networkd.socket. Apr 12 20:49:04.013107 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 20:49:04.013142 systemd[1]: Stopped ignition-disks.service. Apr 12 20:49:04.027675 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 20:49:04.027705 systemd[1]: Stopped ignition-kargs.service. Apr 12 20:49:04.042368 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 20:49:04.042426 systemd[1]: Stopped ignition-setup.service. Apr 12 20:49:04.052129 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 20:49:04.052154 systemd[1]: Stopped initrd-setup-root.service. Apr 12 20:49:04.063013 systemd[1]: Stopping network-cleanup.service... Apr 12 20:49:04.071878 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 20:49:04.071959 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 20:49:04.081681 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 20:49:04.081746 systemd[1]: Stopped systemd-sysctl.service. Apr 12 20:49:04.091391 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 20:49:04.091423 systemd[1]: Stopped systemd-modules-load.service. Apr 12 20:49:04.101631 systemd[1]: Stopping systemd-udevd.service... Apr 12 20:49:04.113542 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 20:49:04.114248 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 20:49:04.114347 systemd[1]: Stopped systemd-udevd.service. Apr 12 20:49:04.123769 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 20:49:04.123898 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 20:49:04.136379 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 20:49:04.136420 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 20:49:04.146254 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 20:49:04.146286 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 20:49:04.156175 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 20:49:04.156206 systemd[1]: Stopped dracut-cmdline.service. Apr 12 20:49:04.165867 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 20:49:04.165896 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 20:49:04.177105 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 20:49:04.185581 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 20:49:04.185648 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 20:49:04.195418 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 20:49:04.195451 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 20:49:04.204445 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 20:49:04.204482 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 20:49:04.215481 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 20:49:04.216110 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 20:49:04.216175 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 20:49:04.796645 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 20:49:04.796719 systemd[1]: Stopped network-cleanup.service. Apr 12 20:49:04.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:04.805377 systemd[1]: Reached target initrd-switch-root.target. Apr 12 20:49:04.815382 systemd[1]: Starting initrd-switch-root.service... Apr 12 20:49:04.827701 systemd[1]: Switching root. Apr 12 20:49:04.874186 systemd-journald[834]: Journal stopped Apr 12 20:49:08.013855 systemd-journald[834]: Received SIGTERM from PID 1 (systemd). Apr 12 20:49:08.013881 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 20:49:08.013892 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 20:49:08.013900 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 20:49:08.013908 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 20:49:08.013916 kernel: SELinux: policy capability open_perms=1 Apr 12 20:49:08.013925 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 20:49:08.013935 kernel: SELinux: policy capability always_check_network=0 Apr 12 20:49:08.013943 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 20:49:08.013950 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 20:49:08.013958 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 20:49:08.013966 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 20:49:08.013975 systemd[1]: Successfully loaded SELinux policy in 142.976ms. Apr 12 20:49:08.013985 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.422ms. Apr 12 20:49:08.013997 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:49:08.014007 systemd[1]: Detected architecture arm64. Apr 12 20:49:08.014015 systemd[1]: Detected first boot. Apr 12 20:49:08.014024 systemd[1]: Hostname set to . Apr 12 20:49:08.014033 systemd[1]: Initializing machine ID from random generator. Apr 12 20:49:08.014044 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 20:49:08.014053 systemd[1]: Populated /etc with preset unit settings. Apr 12 20:49:08.014062 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:49:08.014072 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:49:08.014083 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:49:08.014092 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 20:49:08.014101 systemd[1]: Stopped initrd-switch-root.service. Apr 12 20:49:08.014111 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 20:49:08.014121 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 20:49:08.014130 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 20:49:08.014140 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 20:49:08.014149 systemd[1]: Created slice system-getty.slice. Apr 12 20:49:08.014158 systemd[1]: Created slice system-modprobe.slice. Apr 12 20:49:08.014167 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 20:49:08.014176 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 20:49:08.014186 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 20:49:08.014195 systemd[1]: Created slice user.slice. Apr 12 20:49:08.014204 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:49:08.014213 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 20:49:08.014222 systemd[1]: Set up automount boot.automount. Apr 12 20:49:08.014231 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 20:49:08.014242 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 20:49:08.014251 systemd[1]: Stopped target initrd-fs.target. Apr 12 20:49:08.014265 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 20:49:08.014276 systemd[1]: Reached target integritysetup.target. Apr 12 20:49:08.014285 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:49:08.014294 systemd[1]: Reached target remote-fs.target. Apr 12 20:49:08.014303 systemd[1]: Reached target slices.target. Apr 12 20:49:08.014312 systemd[1]: Reached target swap.target. Apr 12 20:49:08.014322 systemd[1]: Reached target torcx.target. Apr 12 20:49:08.014331 systemd[1]: Reached target veritysetup.target. Apr 12 20:49:08.014340 systemd[1]: Listening on systemd-coredump.socket. Apr 12 20:49:08.014350 systemd[1]: Listening on systemd-initctl.socket. Apr 12 20:49:08.014359 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:49:08.014369 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:49:08.014378 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:49:08.014389 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 20:49:08.014398 systemd[1]: Mounting dev-hugepages.mount... Apr 12 20:49:08.014408 systemd[1]: Mounting dev-mqueue.mount... Apr 12 20:49:08.014417 systemd[1]: Mounting media.mount... Apr 12 20:49:08.014426 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 20:49:08.014436 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 20:49:08.014445 systemd[1]: Mounting tmp.mount... Apr 12 20:49:08.014455 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 20:49:08.014466 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 20:49:08.014477 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:49:08.014487 systemd[1]: Starting modprobe@configfs.service... Apr 12 20:49:08.014496 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 20:49:08.014505 systemd[1]: Starting modprobe@drm.service... Apr 12 20:49:08.014514 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 20:49:08.014523 systemd[1]: Starting modprobe@fuse.service... Apr 12 20:49:08.014532 kernel: fuse: init (API version 7.34) Apr 12 20:49:08.014541 systemd[1]: Starting modprobe@loop.service... Apr 12 20:49:08.014551 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 20:49:08.014561 kernel: loop: module loaded Apr 12 20:49:08.014570 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 20:49:08.014579 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 20:49:08.014589 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 20:49:08.014598 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 20:49:08.014607 kernel: kauditd_printk_skb: 67 callbacks suppressed Apr 12 20:49:08.014616 kernel: audit: type=1131 audit(1712954947.776:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.014625 systemd[1]: Stopped systemd-journald.service. Apr 12 20:49:08.014636 kernel: audit: type=1130 audit(1712954947.834:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.014645 systemd[1]: systemd-journald.service: Consumed 4.535s CPU time. Apr 12 20:49:08.014655 kernel: audit: type=1131 audit(1712954947.834:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.014665 kernel: audit: type=1334 audit(1712954947.917:112): prog-id=18 op=LOAD Apr 12 20:49:08.014674 kernel: audit: type=1334 audit(1712954947.928:113): prog-id=19 op=LOAD Apr 12 20:49:08.014682 kernel: audit: type=1334 audit(1712954947.939:114): prog-id=20 op=LOAD Apr 12 20:49:08.014691 systemd[1]: Starting systemd-journald.service... Apr 12 20:49:08.014700 kernel: audit: type=1334 audit(1712954947.940:115): prog-id=16 op=UNLOAD Apr 12 20:49:08.014710 kernel: audit: type=1334 audit(1712954947.940:116): prog-id=17 op=UNLOAD Apr 12 20:49:08.014718 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:49:08.014728 systemd[1]: Starting systemd-network-generator.service... Apr 12 20:49:08.014737 kernel: audit: type=1305 audit(1712954948.009:117): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:49:08.014748 systemd-journald[1915]: Journal started Apr 12 20:49:08.014789 systemd-journald[1915]: Runtime Journal (/run/log/journal/441e8c709c0b4fb1859dd5ad185e5b81) is 8.0M, max 4.0G, 3.9G free. Apr 12 20:49:05.049000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 20:49:05.196000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:49:05.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:49:05.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:49:05.205000 audit: BPF prog-id=10 op=LOAD Apr 12 20:49:05.205000 audit: BPF prog-id=10 op=UNLOAD Apr 12 20:49:05.205000 audit: BPF prog-id=11 op=LOAD Apr 12 20:49:05.205000 audit: BPF prog-id=11 op=UNLOAD Apr 12 20:49:05.236000 audit[1799]: AVC avc: denied { associate } for pid=1799 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 20:49:05.236000 audit[1799]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40002d189c a1=40001cadf8 a2=40001d10c0 a3=32 items=0 ppid=1781 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:05.236000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:49:05.255000 audit[1799]: AVC avc: denied { associate } for pid=1799 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 20:49:05.255000 audit[1799]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40002d1979 a2=1ed a3=0 items=2 ppid=1781 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:05.255000 audit: CWD cwd="/" Apr 12 20:49:05.255000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:05.255000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:05.255000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:49:06.974000 audit: BPF prog-id=12 op=LOAD Apr 12 20:49:06.974000 audit: BPF prog-id=3 op=UNLOAD Apr 12 20:49:06.974000 audit: BPF prog-id=13 op=LOAD Apr 12 20:49:06.974000 audit: BPF prog-id=14 op=LOAD Apr 12 20:49:06.974000 audit: BPF prog-id=4 op=UNLOAD Apr 12 20:49:06.974000 audit: BPF prog-id=5 op=UNLOAD Apr 12 20:49:06.976000 audit: BPF prog-id=15 op=LOAD Apr 12 20:49:06.976000 audit: BPF prog-id=12 op=UNLOAD Apr 12 20:49:06.976000 audit: BPF prog-id=16 op=LOAD Apr 12 20:49:06.976000 audit: BPF prog-id=17 op=LOAD Apr 12 20:49:06.976000 audit: BPF prog-id=13 op=UNLOAD Apr 12 20:49:06.976000 audit: BPF prog-id=14 op=UNLOAD Apr 12 20:49:06.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.000000 audit: BPF prog-id=15 op=UNLOAD Apr 12 20:49:07.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:07.917000 audit: BPF prog-id=18 op=LOAD Apr 12 20:49:07.928000 audit: BPF prog-id=19 op=LOAD Apr 12 20:49:07.939000 audit: BPF prog-id=20 op=LOAD Apr 12 20:49:07.940000 audit: BPF prog-id=16 op=UNLOAD Apr 12 20:49:07.940000 audit: BPF prog-id=17 op=UNLOAD Apr 12 20:49:08.009000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:49:05.235204 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:49:06.973249 systemd[1]: Queued start job for default target multi-user.target. Apr 12 20:49:05.235502 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:49:06.978005 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 20:49:05.235519 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:49:06.978341 systemd[1]: systemd-journald.service: Consumed 4.535s CPU time. Apr 12 20:49:05.235551 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 20:49:05.235561 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 20:49:05.235586 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 20:49:05.235597 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 20:49:05.235794 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 20:49:05.235829 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:49:05.235840 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:49:05.236635 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 20:49:05.236667 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 20:49:05.236684 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 20:49:05.236697 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 20:49:05.236715 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 20:49:05.236727 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 20:49:06.635848 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:49:06.636109 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:49:06.636201 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:49:06.636682 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:49:06.636751 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 20:49:06.636823 /usr/lib/systemd/system-generators/torcx-generator[1799]: time="2024-04-12T20:49:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 20:49:08.009000 audit[1915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffedaae300 a2=4000 a3=1 items=0 ppid=1 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:08.093929 kernel: audit: type=1300 audit(1712954948.009:117): arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffedaae300 a2=4000 a3=1 items=0 ppid=1 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:08.009000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 20:49:08.111475 systemd[1]: Starting systemd-remount-fs.service... Apr 12 20:49:08.128474 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:49:08.153878 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 20:49:08.153901 systemd[1]: Stopped verity-setup.service. Apr 12 20:49:08.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.170470 systemd[1]: Started systemd-journald.service. Apr 12 20:49:08.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.175572 systemd[1]: Mounted dev-hugepages.mount. Apr 12 20:49:08.180270 systemd[1]: Mounted dev-mqueue.mount. Apr 12 20:49:08.184907 systemd[1]: Mounted media.mount. Apr 12 20:49:08.189423 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 20:49:08.193832 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 20:49:08.198137 systemd[1]: Mounted tmp.mount. Apr 12 20:49:08.202442 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 20:49:08.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.206694 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:49:08.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.210856 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 20:49:08.210988 systemd[1]: Finished modprobe@configfs.service. Apr 12 20:49:08.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.215025 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 20:49:08.215162 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 20:49:08.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.219230 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 20:49:08.219376 systemd[1]: Finished modprobe@drm.service. Apr 12 20:49:08.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.223229 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 20:49:08.223336 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 20:49:08.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.227097 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 20:49:08.227204 systemd[1]: Finished modprobe@fuse.service. Apr 12 20:49:08.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.231074 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 20:49:08.231184 systemd[1]: Finished modprobe@loop.service. Apr 12 20:49:08.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.235029 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:49:08.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.238846 systemd[1]: Finished systemd-network-generator.service. Apr 12 20:49:08.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.242684 systemd[1]: Finished systemd-remount-fs.service. Apr 12 20:49:08.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.246413 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:49:08.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.250275 systemd[1]: Reached target network-pre.target. Apr 12 20:49:08.254808 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 20:49:08.259426 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 20:49:08.262979 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 20:49:08.264386 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 20:49:08.268751 systemd[1]: Starting systemd-journal-flush.service... Apr 12 20:49:08.271991 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 20:49:08.273034 systemd[1]: Starting systemd-random-seed.service... Apr 12 20:49:08.275095 systemd-journald[1915]: Time spent on flushing to /var/log/journal/441e8c709c0b4fb1859dd5ad185e5b81 is 25.280ms for 2592 entries. Apr 12 20:49:08.275095 systemd-journald[1915]: System Journal (/var/log/journal/441e8c709c0b4fb1859dd5ad185e5b81) is 8.0M, max 195.6M, 187.6M free. Apr 12 20:49:08.308340 systemd-journald[1915]: Received client request to flush runtime journal. Apr 12 20:49:08.286795 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 20:49:08.287872 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:49:08.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.292030 systemd[1]: Starting systemd-sysusers.service... Apr 12 20:49:08.296081 systemd[1]: Starting systemd-udev-settle.service... Apr 12 20:49:08.300409 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 20:49:08.303398 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 20:49:08.306401 systemd[1]: Finished systemd-random-seed.service. Apr 12 20:49:08.309283 systemd[1]: Finished systemd-journal-flush.service. Apr 12 20:49:08.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.312037 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:49:08.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.314629 systemd[1]: Finished systemd-sysusers.service. Apr 12 20:49:08.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.318548 systemd[1]: Reached target first-boot-complete.target. Apr 12 20:49:08.322162 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:49:08.326104 udevadm[1929]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 20:49:08.338865 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:49:08.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.603541 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 20:49:08.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.606000 audit: BPF prog-id=21 op=LOAD Apr 12 20:49:08.606000 audit: BPF prog-id=22 op=LOAD Apr 12 20:49:08.606000 audit: BPF prog-id=7 op=UNLOAD Apr 12 20:49:08.606000 audit: BPF prog-id=8 op=UNLOAD Apr 12 20:49:08.607595 systemd[1]: Starting systemd-udevd.service... Apr 12 20:49:08.625373 systemd-udevd[1934]: Using default interface naming scheme 'v252'. Apr 12 20:49:08.637947 systemd[1]: Started systemd-udevd.service. Apr 12 20:49:08.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.641000 audit: BPF prog-id=23 op=LOAD Apr 12 20:49:08.642353 systemd[1]: Starting systemd-networkd.service... Apr 12 20:49:08.647000 audit: BPF prog-id=24 op=LOAD Apr 12 20:49:08.647000 audit: BPF prog-id=25 op=LOAD Apr 12 20:49:08.647000 audit: BPF prog-id=26 op=LOAD Apr 12 20:49:08.649013 systemd[1]: Starting systemd-userdbd.service... Apr 12 20:49:08.652700 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 20:49:08.683474 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1958) Apr 12 20:49:08.683605 kernel: IPMI message handler: version 39.2 Apr 12 20:49:08.688543 systemd[1]: Started systemd-userdbd.service. Apr 12 20:49:08.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.682000 audit[1937]: AVC avc: denied { confidentiality } for pid=1937 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:49:08.694925 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:49:08.682000 audit[1937]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffbcde6010 a1=e46d4 a2=ffffbee224b0 a3=aaaac74f4010 items=312 ppid=1934 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:08.682000 audit: CWD cwd="/" Apr 12 20:49:08.682000 audit: PATH item=0 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=1 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=2 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=3 name=(null) inode=20644 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=4 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=5 name=(null) inode=20645 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=6 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=7 name=(null) inode=20646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=8 name=(null) inode=20646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=9 name=(null) inode=20647 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=10 name=(null) inode=20646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=11 name=(null) inode=20648 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=12 name=(null) inode=20646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=13 name=(null) inode=20649 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=14 name=(null) inode=20646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=15 name=(null) inode=20650 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=16 name=(null) inode=20646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=17 name=(null) inode=20651 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=18 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=19 name=(null) inode=20652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=20 name=(null) inode=20652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=21 name=(null) inode=20653 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=22 name=(null) inode=20652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=23 name=(null) inode=20654 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=24 name=(null) inode=20652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=25 name=(null) inode=20655 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=26 name=(null) inode=20652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=27 name=(null) inode=20656 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=28 name=(null) inode=20652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=29 name=(null) inode=20657 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=30 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=31 name=(null) inode=20658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=32 name=(null) inode=20658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=33 name=(null) inode=20659 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=34 name=(null) inode=20658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=35 name=(null) inode=20660 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=36 name=(null) inode=20658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=37 name=(null) inode=20661 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=38 name=(null) inode=20658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=39 name=(null) inode=20662 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=40 name=(null) inode=20658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=41 name=(null) inode=20663 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=42 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=43 name=(null) inode=20664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=44 name=(null) inode=20664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=45 name=(null) inode=20665 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=46 name=(null) inode=20664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=47 name=(null) inode=20666 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=48 name=(null) inode=20664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=49 name=(null) inode=20667 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=50 name=(null) inode=20664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=51 name=(null) inode=20668 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=52 name=(null) inode=20664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=53 name=(null) inode=20669 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=54 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=55 name=(null) inode=20670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=56 name=(null) inode=20670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=57 name=(null) inode=20671 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=58 name=(null) inode=20670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=59 name=(null) inode=20672 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=60 name=(null) inode=20670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=61 name=(null) inode=20673 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=62 name=(null) inode=20670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=63 name=(null) inode=20674 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=64 name=(null) inode=20670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=65 name=(null) inode=20675 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=66 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=67 name=(null) inode=20676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=68 name=(null) inode=20676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=69 name=(null) inode=20677 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=70 name=(null) inode=20676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=71 name=(null) inode=20678 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=72 name=(null) inode=20676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=73 name=(null) inode=20679 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=74 name=(null) inode=20676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=75 name=(null) inode=20680 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=76 name=(null) inode=20676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=77 name=(null) inode=20681 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=78 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=79 name=(null) inode=20682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=80 name=(null) inode=20682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=81 name=(null) inode=20683 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=82 name=(null) inode=20682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=83 name=(null) inode=20684 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=84 name=(null) inode=20682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=85 name=(null) inode=20685 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=86 name=(null) inode=20682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=87 name=(null) inode=20686 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=88 name=(null) inode=20682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=89 name=(null) inode=20687 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=90 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=91 name=(null) inode=20688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=92 name=(null) inode=20688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=93 name=(null) inode=20689 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=94 name=(null) inode=20688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=95 name=(null) inode=20690 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=96 name=(null) inode=20688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=97 name=(null) inode=20691 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=98 name=(null) inode=20688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=99 name=(null) inode=20692 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=100 name=(null) inode=20688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=101 name=(null) inode=20693 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=102 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=103 name=(null) inode=20694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.700468 kernel: ipmi device interface Apr 12 20:49:08.682000 audit: PATH item=104 name=(null) inode=20694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=105 name=(null) inode=20695 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=106 name=(null) inode=20694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=107 name=(null) inode=20696 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=108 name=(null) inode=20694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=109 name=(null) inode=20697 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=110 name=(null) inode=20694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=111 name=(null) inode=20698 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=112 name=(null) inode=20694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=113 name=(null) inode=20699 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=114 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=115 name=(null) inode=20700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=116 name=(null) inode=20700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=117 name=(null) inode=20701 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=118 name=(null) inode=20700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=119 name=(null) inode=20702 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=120 name=(null) inode=20700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=121 name=(null) inode=20703 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=122 name=(null) inode=20700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=123 name=(null) inode=20704 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=124 name=(null) inode=20700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=125 name=(null) inode=20705 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=126 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=127 name=(null) inode=20706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=128 name=(null) inode=20706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=129 name=(null) inode=20707 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=130 name=(null) inode=20706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=131 name=(null) inode=20708 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=132 name=(null) inode=20706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=133 name=(null) inode=20709 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=134 name=(null) inode=20706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=135 name=(null) inode=20710 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=136 name=(null) inode=20706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=137 name=(null) inode=20711 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=138 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=139 name=(null) inode=20712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=140 name=(null) inode=20712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=141 name=(null) inode=20713 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=142 name=(null) inode=20712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=143 name=(null) inode=20714 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=144 name=(null) inode=20712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=145 name=(null) inode=20715 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=146 name=(null) inode=20712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=147 name=(null) inode=20716 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=148 name=(null) inode=20712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=149 name=(null) inode=20717 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=150 name=(null) inode=20643 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=151 name=(null) inode=20718 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=152 name=(null) inode=20718 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=153 name=(null) inode=20719 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=154 name=(null) inode=20718 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=155 name=(null) inode=20720 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=156 name=(null) inode=20718 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=157 name=(null) inode=20721 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=158 name=(null) inode=20718 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=159 name=(null) inode=20722 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=160 name=(null) inode=20718 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=161 name=(null) inode=20723 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=162 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=163 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=164 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=165 name=(null) inode=20725 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=166 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=167 name=(null) inode=20726 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=168 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=169 name=(null) inode=20727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=170 name=(null) inode=20727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=171 name=(null) inode=20728 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=172 name=(null) inode=20727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=173 name=(null) inode=20729 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=174 name=(null) inode=20727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=175 name=(null) inode=20730 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=176 name=(null) inode=20727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=177 name=(null) inode=20731 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=178 name=(null) inode=20727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=179 name=(null) inode=20732 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=180 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=181 name=(null) inode=20733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=182 name=(null) inode=20733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=183 name=(null) inode=20734 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=184 name=(null) inode=20733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=185 name=(null) inode=20735 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=186 name=(null) inode=20733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=187 name=(null) inode=20736 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=188 name=(null) inode=20733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=189 name=(null) inode=20737 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=190 name=(null) inode=20733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=191 name=(null) inode=20738 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=192 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=193 name=(null) inode=20739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=194 name=(null) inode=20739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=195 name=(null) inode=20740 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=196 name=(null) inode=20739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=197 name=(null) inode=20741 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=198 name=(null) inode=20739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=199 name=(null) inode=20742 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=200 name=(null) inode=20739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=201 name=(null) inode=20743 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=202 name=(null) inode=20739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=203 name=(null) inode=20744 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=204 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=205 name=(null) inode=20745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=206 name=(null) inode=20745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=207 name=(null) inode=20746 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=208 name=(null) inode=20745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=209 name=(null) inode=20747 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=210 name=(null) inode=20745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=211 name=(null) inode=20748 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=212 name=(null) inode=20745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=213 name=(null) inode=20749 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=214 name=(null) inode=20745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=215 name=(null) inode=20750 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=216 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=217 name=(null) inode=20751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=218 name=(null) inode=20751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=219 name=(null) inode=20752 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=220 name=(null) inode=20751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=221 name=(null) inode=20753 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=222 name=(null) inode=20751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=223 name=(null) inode=20754 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=224 name=(null) inode=20751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=225 name=(null) inode=20755 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=226 name=(null) inode=20751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=227 name=(null) inode=20756 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=228 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=229 name=(null) inode=20757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=230 name=(null) inode=20757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=231 name=(null) inode=20758 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=232 name=(null) inode=20757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=233 name=(null) inode=20759 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=234 name=(null) inode=20757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=235 name=(null) inode=20760 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=236 name=(null) inode=20757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=237 name=(null) inode=20761 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=238 name=(null) inode=20757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=239 name=(null) inode=20762 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=240 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=241 name=(null) inode=20763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=242 name=(null) inode=20763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=243 name=(null) inode=20764 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=244 name=(null) inode=20763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=245 name=(null) inode=20765 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=246 name=(null) inode=20763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=247 name=(null) inode=20766 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=248 name=(null) inode=20763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=249 name=(null) inode=20767 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=250 name=(null) inode=20763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=251 name=(null) inode=20768 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=252 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=253 name=(null) inode=20769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=254 name=(null) inode=20769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=255 name=(null) inode=20770 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=256 name=(null) inode=20769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=257 name=(null) inode=20771 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=258 name=(null) inode=20769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=259 name=(null) inode=20772 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=260 name=(null) inode=20769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=261 name=(null) inode=20773 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=262 name=(null) inode=20769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=263 name=(null) inode=20774 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=264 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=265 name=(null) inode=20775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=266 name=(null) inode=20775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=267 name=(null) inode=20776 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=268 name=(null) inode=20775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=269 name=(null) inode=20777 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=270 name=(null) inode=20775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=271 name=(null) inode=20778 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=272 name=(null) inode=20775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=273 name=(null) inode=20779 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=274 name=(null) inode=20775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=275 name=(null) inode=20780 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=276 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=277 name=(null) inode=20781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=278 name=(null) inode=20781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=279 name=(null) inode=20782 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=280 name=(null) inode=20781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=281 name=(null) inode=20783 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=282 name=(null) inode=20781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=283 name=(null) inode=20784 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=284 name=(null) inode=20781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=285 name=(null) inode=20785 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=286 name=(null) inode=20781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=287 name=(null) inode=20786 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=288 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=289 name=(null) inode=20787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=290 name=(null) inode=20787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=291 name=(null) inode=20788 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=292 name=(null) inode=20787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=293 name=(null) inode=20789 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=294 name=(null) inode=20787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=295 name=(null) inode=20790 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=296 name=(null) inode=20787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=297 name=(null) inode=20791 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=298 name=(null) inode=20787 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=299 name=(null) inode=20792 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=300 name=(null) inode=20724 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=301 name=(null) inode=20793 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=302 name=(null) inode=20793 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=303 name=(null) inode=20794 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=304 name=(null) inode=20793 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=305 name=(null) inode=20795 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=306 name=(null) inode=20793 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=307 name=(null) inode=20796 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=308 name=(null) inode=20793 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=309 name=(null) inode=20797 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=310 name=(null) inode=20793 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PATH item=311 name=(null) inode=20798 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:49:08.682000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 20:49:08.711464 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 20:49:08.727649 kernel: ipmi_si: IPMI System Interface driver Apr 12 20:49:08.727686 kernel: ipmi_si: Unable to find any System Interface(s) Apr 12 20:49:08.753765 systemd[1]: Finished systemd-udev-settle.service. Apr 12 20:49:08.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.758238 systemd[1]: Starting lvm2-activation-early.service... Apr 12 20:49:08.763619 systemd-networkd[1943]: bond0: netdev ready Apr 12 20:49:08.766814 systemd-networkd[1943]: lo: Link UP Apr 12 20:49:08.766820 systemd-networkd[1943]: lo: Gained carrier Apr 12 20:49:08.770073 lvm[2019]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:49:08.771696 systemd-networkd[1943]: Enumeration completed Apr 12 20:49:08.771765 systemd[1]: Started systemd-networkd.service. Apr 12 20:49:08.772126 systemd-networkd[1943]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 20:49:08.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.784326 systemd-networkd[1943]: enP1p1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:49:c6:ad.network. Apr 12 20:49:08.802101 systemd[1]: Finished lvm2-activation-early.service. Apr 12 20:49:08.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.805492 systemd[1]: Reached target cryptsetup.target. Apr 12 20:49:08.810040 systemd[1]: Starting lvm2-activation.service... Apr 12 20:49:08.814695 lvm[2020]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:49:08.850288 systemd[1]: Finished lvm2-activation.service. Apr 12 20:49:08.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.853469 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:49:08.856895 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 20:49:08.856914 systemd[1]: Reached target local-fs.target. Apr 12 20:49:08.860367 systemd[1]: Reached target machines.target. Apr 12 20:49:08.864965 systemd[1]: Starting ldconfig.service... Apr 12 20:49:08.868669 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 20:49:08.868731 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:49:08.870130 systemd[1]: Starting systemd-boot-update.service... Apr 12 20:49:08.874517 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 20:49:08.879007 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 20:49:08.882216 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:49:08.882249 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:49:08.883389 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 20:49:08.888426 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 20:49:08.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.891862 systemd[1]: boot.automount: Got automount request for /boot, triggered by 2022 (bootctl) Apr 12 20:49:08.893217 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 20:49:08.894236 systemd-tmpfiles[2027]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:49:08.895342 systemd-tmpfiles[2027]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:49:08.896720 systemd-tmpfiles[2027]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:49:08.991870 systemd-fsck[2035]: fsck.fat 4.2 (2021-01-31) Apr 12 20:49:08.991870 systemd-fsck[2035]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 20:49:08.993196 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 20:49:08.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:08.997821 systemd[1]: Mounting boot.mount... Apr 12 20:49:09.019920 systemd[1]: Mounted boot.mount. Apr 12 20:49:09.023511 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 20:49:09.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:09.032431 systemd[1]: Finished systemd-boot-update.service. Apr 12 20:49:09.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:09.084347 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 20:49:09.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:09.088926 systemd[1]: Starting audit-rules.service... Apr 12 20:49:09.093366 systemd[1]: Starting clean-ca-certificates.service... Apr 12 20:49:09.098013 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 20:49:09.102000 audit: BPF prog-id=27 op=LOAD Apr 12 20:49:09.103367 systemd[1]: Starting systemd-resolved.service... Apr 12 20:49:09.107000 audit: BPF prog-id=28 op=LOAD Apr 12 20:49:09.108598 systemd[1]: Starting systemd-timesyncd.service... Apr 12 20:49:09.113137 systemd[1]: Starting systemd-update-utmp.service... Apr 12 20:49:09.116634 systemd[1]: Finished clean-ca-certificates.service. Apr 12 20:49:09.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:09.119000 audit[2057]: SYSTEM_BOOT pid=2057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 20:49:09.119000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 20:49:09.119000 audit[2059]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe6a9bc0 a2=420 a3=0 items=0 ppid=2039 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:09.119000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 20:49:09.119948 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 20:49:09.120486 augenrules[2059]: No rules Apr 12 20:49:09.123269 systemd[1]: Finished audit-rules.service. Apr 12 20:49:09.128791 systemd[1]: Finished systemd-update-utmp.service. Apr 12 20:49:09.131758 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 20:49:09.135658 ldconfig[2021]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 20:49:09.137589 systemd[1]: Finished ldconfig.service. Apr 12 20:49:09.141633 systemd[1]: Starting systemd-update-done.service... Apr 12 20:49:09.148102 systemd[1]: Finished systemd-update-done.service. Apr 12 20:49:09.160039 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 20:49:09.163839 systemd[1]: Started systemd-timesyncd.service. Apr 12 20:49:09.166396 systemd-resolved[2051]: Positive Trust Anchors: Apr 12 20:49:09.166404 systemd-resolved[2051]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:49:09.166431 systemd-resolved[2051]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:49:09.166585 systemd[1]: Reached target time-set.target. Apr 12 20:49:09.169642 systemd-resolved[2051]: Using system hostname 'ci-3510.3.3-a-aaaf4a72a0'. Apr 12 20:49:10.401477 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 20:49:10.416466 kernel: bond0: (slave enP1p1s0f1np1): Enslaving as a backup interface with an up link Apr 12 20:49:10.417229 systemd-networkd[1943]: enP1p1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:49:c6:ac.network. Apr 12 20:49:10.418586 systemd[1]: Started systemd-resolved.service. Apr 12 20:49:10.421535 systemd[1]: Reached target network.target. Apr 12 20:49:10.424322 systemd[1]: Reached target nss-lookup.target. Apr 12 20:49:10.427118 systemd[1]: Reached target sysinit.target. Apr 12 20:49:10.429915 systemd[1]: Started motdgen.path. Apr 12 20:49:10.432719 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 20:49:10.435782 systemd[1]: Started logrotate.timer. Apr 12 20:49:10.437465 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:49:10.453600 systemd[1]: Started mdadm.timer. Apr 12 20:49:10.456713 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 20:49:10.459841 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 20:49:10.459860 systemd[1]: Reached target paths.target. Apr 12 20:49:10.462961 systemd[1]: Reached target timers.target. Apr 12 20:49:10.466287 systemd[1]: Listening on dbus.socket. Apr 12 20:49:10.470521 systemd[1]: Starting docker.socket... Apr 12 20:49:10.476076 systemd[1]: Listening on sshd.socket. Apr 12 20:49:10.479160 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:49:10.479575 systemd[1]: Listening on docker.socket. Apr 12 20:49:10.482593 systemd[1]: Reached target sockets.target. Apr 12 20:49:10.485561 systemd[1]: Reached target basic.target. Apr 12 20:49:10.488543 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:49:10.488563 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:49:10.489692 systemd[1]: Starting containerd.service... Apr 12 20:49:10.493635 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 20:49:10.497893 systemd[1]: Starting coreos-metadata.service... Apr 12 20:49:10.502187 systemd[1]: Starting dbus.service... Apr 12 20:49:10.506210 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 20:49:10.510368 systemd[1]: Starting extend-filesystems.service... Apr 12 20:49:10.511669 jq[2075]: false Apr 12 20:49:10.513405 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 20:49:10.514585 systemd[1]: Starting motdgen.service... Apr 12 20:49:10.518805 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 20:49:10.520099 dbus-daemon[2074]: [system] SELinux support is enabled Apr 12 20:49:10.522814 extend-filesystems[2076]: Found nvme0n1 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p1 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p2 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p3 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found usr Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p4 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p6 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p7 Apr 12 20:49:10.526291 extend-filesystems[2076]: Found nvme0n1p9 Apr 12 20:49:10.526291 extend-filesystems[2076]: Checking size of /dev/nvme0n1p9 Apr 12 20:49:10.604375 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:49:10.604403 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 233815889 blocks Apr 12 20:49:10.523748 systemd[1]: Starting prepare-critools.service... Apr 12 20:49:10.604545 extend-filesystems[2076]: Resized partition /dev/nvme0n1p9 Apr 12 20:49:10.611227 coreos-metadata[2068]: Apr 12 20:49:10.533 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:49:10.611227 coreos-metadata[2068]: Apr 12 20:49:10.537 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 20:49:10.611418 coreos-metadata[2071]: Apr 12 20:49:10.537 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:49:10.611418 coreos-metadata[2071]: Apr 12 20:49:10.538 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 20:49:10.531590 systemd[1]: Starting prepare-helm.service... Apr 12 20:49:10.611725 extend-filesystems[2095]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 20:49:10.538971 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 20:49:10.573749 systemd[1]: Starting sshd-keygen.service... Apr 12 20:49:10.582530 systemd[1]: Starting systemd-logind.service... Apr 12 20:49:10.588430 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:49:10.588629 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 20:49:10.616016 jq[2108]: true Apr 12 20:49:10.589471 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 20:49:10.590975 systemd[1]: Starting update-engine.service... Apr 12 20:49:10.597423 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 20:49:10.603367 systemd[1]: Started dbus.service. Apr 12 20:49:10.613380 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 20:49:10.613673 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 20:49:10.614342 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 20:49:10.614509 systemd[1]: Finished motdgen.service. Apr 12 20:49:10.620676 systemd-logind[2105]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 20:49:10.620857 systemd-logind[2105]: New seat seat0. Apr 12 20:49:10.621445 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 20:49:10.621620 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 20:49:10.627635 tar[2110]: ./ Apr 12 20:49:10.627790 tar[2110]: ./loopback Apr 12 20:49:10.629671 dbus-daemon[2074]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 20:49:10.630167 jq[2116]: true Apr 12 20:49:10.630402 tar[2111]: crictl Apr 12 20:49:10.632737 tar[2112]: linux-arm64/helm Apr 12 20:49:10.635827 update_engine[2107]: I0412 20:49:10.635581 2107 main.cc:92] Flatcar Update Engine starting Apr 12 20:49:10.637084 systemd[1]: Started systemd-logind.service. Apr 12 20:49:10.638915 update_engine[2107]: I0412 20:49:10.638901 2107 update_check_scheduler.cc:74] Next update check in 8m59s Apr 12 20:49:10.641129 systemd[1]: Started update-engine.service. Apr 12 20:49:10.647298 systemd[1]: Started locksmithd.service. Apr 12 20:49:10.651130 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 20:49:10.651262 systemd[1]: Reached target system-config.target. Apr 12 20:49:10.651747 tar[2110]: ./bandwidth Apr 12 20:49:10.655081 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 20:49:10.655193 systemd[1]: Reached target user-config.target. Apr 12 20:49:10.665939 bash[2138]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:49:10.666631 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 20:49:10.679061 env[2117]: time="2024-04-12T20:49:10.679021480Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 20:49:10.688176 tar[2110]: ./ptp Apr 12 20:49:10.688932 locksmithd[2140]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 20:49:10.694822 env[2117]: time="2024-04-12T20:49:10.694789600Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 20:49:10.694961 env[2117]: time="2024-04-12T20:49:10.694948920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696010 env[2117]: time="2024-04-12T20:49:10.695988680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696037 env[2117]: time="2024-04-12T20:49:10.696011640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696218 env[2117]: time="2024-04-12T20:49:10.696202680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696241 env[2117]: time="2024-04-12T20:49:10.696220520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696241 env[2117]: time="2024-04-12T20:49:10.696233160Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 20:49:10.696283 env[2117]: time="2024-04-12T20:49:10.696243080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696327 env[2117]: time="2024-04-12T20:49:10.696316840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696612 env[2117]: time="2024-04-12T20:49:10.696599200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696728 env[2117]: time="2024-04-12T20:49:10.696714760Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:49:10.696754 env[2117]: time="2024-04-12T20:49:10.696730600Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 20:49:10.696799 env[2117]: time="2024-04-12T20:49:10.696788480Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 20:49:10.696824 env[2117]: time="2024-04-12T20:49:10.696801840Z" level=info msg="metadata content store policy set" policy=shared Apr 12 20:49:10.703023 env[2117]: time="2024-04-12T20:49:10.703005640Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 20:49:10.703045 env[2117]: time="2024-04-12T20:49:10.703031400Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 20:49:10.703071 env[2117]: time="2024-04-12T20:49:10.703044160Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 20:49:10.703092 env[2117]: time="2024-04-12T20:49:10.703079440Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703125 env[2117]: time="2024-04-12T20:49:10.703093000Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703125 env[2117]: time="2024-04-12T20:49:10.703106080Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703125 env[2117]: time="2024-04-12T20:49:10.703117560Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703427 env[2117]: time="2024-04-12T20:49:10.703416640Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703451 env[2117]: time="2024-04-12T20:49:10.703433280Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703451 env[2117]: time="2024-04-12T20:49:10.703446440Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703491 env[2117]: time="2024-04-12T20:49:10.703463120Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703491 env[2117]: time="2024-04-12T20:49:10.703476760Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 20:49:10.703606 env[2117]: time="2024-04-12T20:49:10.703594200Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 20:49:10.703676 env[2117]: time="2024-04-12T20:49:10.703665400Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 20:49:10.703873 env[2117]: time="2024-04-12T20:49:10.703862120Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 20:49:10.703896 env[2117]: time="2024-04-12T20:49:10.703885280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.703915 env[2117]: time="2024-04-12T20:49:10.703897880Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 20:49:10.704010 env[2117]: time="2024-04-12T20:49:10.704000800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704036 env[2117]: time="2024-04-12T20:49:10.704014160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704036 env[2117]: time="2024-04-12T20:49:10.704030000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704072 env[2117]: time="2024-04-12T20:49:10.704043640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704072 env[2117]: time="2024-04-12T20:49:10.704056560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704072 env[2117]: time="2024-04-12T20:49:10.704068960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704126 env[2117]: time="2024-04-12T20:49:10.704080000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704126 env[2117]: time="2024-04-12T20:49:10.704092480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704126 env[2117]: time="2024-04-12T20:49:10.704105280Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 20:49:10.704228 env[2117]: time="2024-04-12T20:49:10.704217760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704251 env[2117]: time="2024-04-12T20:49:10.704234240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704251 env[2117]: time="2024-04-12T20:49:10.704247400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704288 env[2117]: time="2024-04-12T20:49:10.704258720Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 20:49:10.704288 env[2117]: time="2024-04-12T20:49:10.704272520Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 20:49:10.704288 env[2117]: time="2024-04-12T20:49:10.704283000Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 20:49:10.704344 env[2117]: time="2024-04-12T20:49:10.704300400Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 20:49:10.704344 env[2117]: time="2024-04-12T20:49:10.704331920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 20:49:10.704562 env[2117]: time="2024-04-12T20:49:10.704522160Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 20:49:10.705327 env[2117]: time="2024-04-12T20:49:10.704573480Z" level=info msg="Connect containerd service" Apr 12 20:49:10.705327 env[2117]: time="2024-04-12T20:49:10.704603320Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 20:49:10.705327 env[2117]: time="2024-04-12T20:49:10.705170720Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 20:49:10.705430 env[2117]: time="2024-04-12T20:49:10.705398120Z" level=info msg="Start subscribing containerd event" Apr 12 20:49:10.705465 env[2117]: time="2024-04-12T20:49:10.705448560Z" level=info msg="Start recovering state" Apr 12 20:49:10.705533 env[2117]: time="2024-04-12T20:49:10.705520040Z" level=info msg="Start event monitor" Apr 12 20:49:10.705555 env[2117]: time="2024-04-12T20:49:10.705543680Z" level=info msg="Start snapshots syncer" Apr 12 20:49:10.705575 env[2117]: time="2024-04-12T20:49:10.705553640Z" level=info msg="Start cni network conf syncer for default" Apr 12 20:49:10.705575 env[2117]: time="2024-04-12T20:49:10.705562880Z" level=info msg="Start streaming server" Apr 12 20:49:10.705617 env[2117]: time="2024-04-12T20:49:10.705523720Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 20:49:10.705896 env[2117]: time="2024-04-12T20:49:10.705868520Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 20:49:10.706046 env[2117]: time="2024-04-12T20:49:10.706035040Z" level=info msg="containerd successfully booted in 0.027767s" Apr 12 20:49:10.706097 systemd[1]: Started containerd.service. Apr 12 20:49:10.720216 tar[2110]: ./vlan Apr 12 20:49:10.748713 tar[2110]: ./host-device Apr 12 20:49:10.776219 tar[2110]: ./tuning Apr 12 20:49:10.800963 tar[2110]: ./vrf Apr 12 20:49:10.826448 tar[2110]: ./sbr Apr 12 20:49:10.851510 tar[2110]: ./tap Apr 12 20:49:10.880379 tar[2110]: ./dhcp Apr 12 20:49:10.945659 tar[2112]: linux-arm64/LICENSE Apr 12 20:49:10.945720 tar[2112]: linux-arm64/README.md Apr 12 20:49:10.949828 systemd[1]: Finished prepare-helm.service. Apr 12 20:49:10.950967 tar[2110]: ./static Apr 12 20:49:10.962798 systemd[1]: Finished prepare-critools.service. Apr 12 20:49:10.971743 tar[2110]: ./firewall Apr 12 20:49:11.003143 tar[2110]: ./macvlan Apr 12 20:49:11.031692 tar[2110]: ./dummy Apr 12 20:49:11.059780 tar[2110]: ./bridge Apr 12 20:49:11.108272 tar[2110]: ./ipvlan Apr 12 20:49:11.136385 tar[2110]: ./portmap Apr 12 20:49:11.162473 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 20:49:11.163135 tar[2110]: ./host-local Apr 12 20:49:11.179472 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:49:11.179504 kernel: bond0: (slave enP1p1s0f0np0): Enslaving as a backup interface with an up link Apr 12 20:49:11.191462 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 20:49:11.196352 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 20:49:11.225676 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 20:49:11.225704 kernel: bond0: active interface up! Apr 12 20:49:11.239432 systemd-networkd[1943]: bond0: Link UP Apr 12 20:49:11.239499 kernel: bond0: (slave enP1p1s0f0np0): link status definitely up, 25000 Mbps full duplex Apr 12 20:49:11.239814 systemd-networkd[1943]: enP1p1s0f1np1: Link UP Apr 12 20:49:11.240071 systemd-networkd[1943]: enP1p1s0f1np1: Gained carrier Apr 12 20:49:11.241109 systemd-networkd[1943]: enP1p1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:49:c6:ac.network. Apr 12 20:49:11.300471 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:49:11.352470 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.366463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.381462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.395461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.409461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.423461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.438463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.453461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.468463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.482465 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.496464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.510463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.523461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.536463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.538254 coreos-metadata[2068]: Apr 12 20:49:11.538 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:49:11.538789 coreos-metadata[2071]: Apr 12 20:49:11.538 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:49:11.539064 coreos-metadata[2071]: Apr 12 20:49:11.539 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 20:49:11.549309 coreos-metadata[2068]: Apr 12 20:49:11.549 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 20:49:11.549462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.562463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.576466 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.590463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.604463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.617461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.630461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.643461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.656464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.670465 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.684464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.697461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.710464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.722463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.724463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.744463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.757462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.769461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.780464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.791461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.802464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.814464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.825461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.836463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.836490 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 233815889 Apr 12 20:49:11.843462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.862212 extend-filesystems[2095]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 20:49:11.862212 extend-filesystems[2095]: old_desc_blocks = 1, new_desc_blocks = 112 Apr 12 20:49:11.862212 extend-filesystems[2095]: The filesystem on /dev/nvme0n1p9 is now 233815889 (4k) blocks long. Apr 12 20:49:11.935856 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935875 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935888 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935914 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935928 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935940 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935953 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.935969 extend-filesystems[2076]: Resized filesystem in /dev/nvme0n1p9 Apr 12 20:49:11.935969 extend-filesystems[2076]: Found nvme1n1 Apr 12 20:49:11.975847 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.975901 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.975929 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:11.863050 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 20:49:11.863214 systemd[1]: Finished extend-filesystems.service. Apr 12 20:49:11.990463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.003461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.017461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.030463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.044463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.057461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.071461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.084465 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.098463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.111461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.124463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.137461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.146752 sshd_keygen[2106]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 20:49:12.151462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.164462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.164570 systemd[1]: Finished sshd-keygen.service. Apr 12 20:49:12.166462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.191464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.193102 systemd[1]: Starting issuegen.service... Apr 12 20:49:12.195461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.220461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.220833 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 20:49:12.220979 systemd[1]: Finished issuegen.service. Apr 12 20:49:12.223463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.248462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.249270 systemd[1]: Starting systemd-user-sessions.service... Apr 12 20:49:12.250466 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.253462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.288461 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.288638 systemd[1]: Finished systemd-user-sessions.service. Apr 12 20:49:12.291463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.315466 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.316657 systemd[1]: Started getty@tty1.service. Apr 12 20:49:12.318463 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.320464 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.355462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.355762 systemd-networkd[1943]: enP1p1s0f0np0: Link UP Apr 12 20:49:12.355938 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 20:49:12.356058 systemd-networkd[1943]: bond0: Gained carrier Apr 12 20:49:12.356216 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:12.356221 systemd-networkd[1943]: enP1p1s0f0np0: Gained carrier Apr 12 20:49:12.357462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:49:12.357497 kernel: bond0: (slave enP1p1s0f1np1): invalid new link 1 on slave Apr 12 20:49:12.379955 systemd[1]: Reached target getty.target. Apr 12 20:49:12.381715 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:12.381758 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:12.382009 systemd-networkd[1943]: enP1p1s0f1np1: Link DOWN Apr 12 20:49:12.382014 systemd-networkd[1943]: enP1p1s0f1np1: Lost carrier Apr 12 20:49:12.390721 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:12.390769 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:12.390789 systemd-networkd[1943]: bond0: Gained IPv6LL Apr 12 20:49:12.390928 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:12.391222 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:13.195473 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 20:49:13.207463 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 20:49:13.207499 kernel: bond0: (slave enP1p1s0f1np1): speed changed to 0 on port 1 Apr 12 20:49:13.217469 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 20:49:13.217940 systemd-networkd[1943]: enP1p1s0f1np1: Link UP Apr 12 20:49:13.218154 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:13.218246 systemd-networkd[1943]: enP1p1s0f1np1: Gained carrier Apr 12 20:49:13.218253 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:13.240463 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 20:49:13.249622 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:13.249662 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:13.249798 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:13.539239 coreos-metadata[2071]: Apr 12 20:49:13.539 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 20:49:13.549469 coreos-metadata[2068]: Apr 12 20:49:13.549 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 20:49:14.243810 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:14.243911 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:14.865471 kernel: mlx5_core 0001:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 20:49:17.342717 login[2179]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 20:49:17.344122 login[2180]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:49:17.352618 systemd-logind[2105]: New session 1 of user core. Apr 12 20:49:17.353711 systemd[1]: Created slice user-500.slice. Apr 12 20:49:17.354963 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 20:49:17.362314 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 20:49:17.363863 systemd[1]: Starting user@500.service... Apr 12 20:49:17.366768 (systemd)[2189]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:17.450164 systemd[2189]: Queued start job for default target default.target. Apr 12 20:49:17.450643 systemd[2189]: Reached target paths.target. Apr 12 20:49:17.450661 systemd[2189]: Reached target sockets.target. Apr 12 20:49:17.450672 systemd[2189]: Reached target timers.target. Apr 12 20:49:17.450681 systemd[2189]: Reached target basic.target. Apr 12 20:49:17.450722 systemd[2189]: Reached target default.target. Apr 12 20:49:17.450747 systemd[2189]: Startup finished in 79ms. Apr 12 20:49:17.450781 systemd[1]: Started user@500.service. Apr 12 20:49:17.451798 systemd[1]: Started session-1.scope. Apr 12 20:49:18.343329 login[2179]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:49:18.347181 systemd-logind[2105]: New session 2 of user core. Apr 12 20:49:18.348295 systemd[1]: Started session-2.scope. Apr 12 20:49:18.770472 kernel: mlx5_core 0001:01:00.0: modify lag map port 1:2 port 2:2 Apr 12 20:49:18.770730 kernel: mlx5_core 0001:01:00.0: modify lag map port 1:1 port 2:2 Apr 12 20:49:19.684108 coreos-metadata[2071]: Apr 12 20:49:19.684 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:49:19.684548 coreos-metadata[2068]: Apr 12 20:49:19.684 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 20:49:20.395089 systemd[1]: Created slice system-sshd.slice. Apr 12 20:49:20.396429 systemd[1]: Started sshd@0-147.28.150.175:22-139.178.89.65:56224.service. Apr 12 20:49:20.866919 sshd[2210]: Accepted publickey for core from 139.178.89.65 port 56224 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:20.868425 sshd[2210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:20.870827 systemd-logind[2105]: New session 3 of user core. Apr 12 20:49:20.871771 systemd[1]: Started session-3.scope. Apr 12 20:49:21.272082 systemd[1]: Started sshd@1-147.28.150.175:22-139.178.89.65:56226.service. Apr 12 20:49:21.737051 sshd[2215]: Accepted publickey for core from 139.178.89.65 port 56226 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:21.738078 sshd[2215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:21.740326 systemd-logind[2105]: New session 4 of user core. Apr 12 20:49:21.741324 systemd[1]: Started session-4.scope. Apr 12 20:49:22.073778 sshd[2215]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:22.076136 systemd[1]: sshd@1-147.28.150.175:22-139.178.89.65:56226.service: Deactivated successfully. Apr 12 20:49:22.076813 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 20:49:22.077237 systemd-logind[2105]: Session 4 logged out. Waiting for processes to exit. Apr 12 20:49:22.077719 systemd-logind[2105]: Removed session 4. Apr 12 20:49:22.148563 systemd[1]: Started sshd@2-147.28.150.175:22-139.178.89.65:56238.service. Apr 12 20:49:22.603214 sshd[2221]: Accepted publickey for core from 139.178.89.65 port 56238 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:22.604276 sshd[2221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:22.606479 systemd-logind[2105]: New session 5 of user core. Apr 12 20:49:22.607392 systemd[1]: Started session-5.scope. Apr 12 20:49:22.932899 sshd[2221]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:22.935348 systemd[1]: sshd@2-147.28.150.175:22-139.178.89.65:56238.service: Deactivated successfully. Apr 12 20:49:22.936037 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 20:49:22.936481 systemd-logind[2105]: Session 5 logged out. Waiting for processes to exit. Apr 12 20:49:22.936998 systemd-logind[2105]: Removed session 5. Apr 12 20:49:23.684279 coreos-metadata[2071]: Apr 12 20:49:23.684 INFO Fetching https://metadata.packet.net/metadata: Attempt #4 Apr 12 20:49:23.684846 coreos-metadata[2068]: Apr 12 20:49:23.684 INFO Fetching https://metadata.packet.net/metadata: Attempt #4 Apr 12 20:49:23.707248 coreos-metadata[2071]: Apr 12 20:49:23.707 INFO Fetch successful Apr 12 20:49:23.707328 coreos-metadata[2068]: Apr 12 20:49:23.707 INFO Fetch successful Apr 12 20:49:23.744601 systemd[1]: Finished coreos-metadata.service. Apr 12 20:49:23.744872 unknown[2068]: wrote ssh authorized keys file for user: core Apr 12 20:49:23.746112 systemd[1]: Started packet-phone-home.service. Apr 12 20:49:23.752035 curl[2228]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 20:49:23.752200 curl[2228]: Dload Upload Total Spent Left Speed Apr 12 20:49:23.757636 update-ssh-keys[2229]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:49:23.758031 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 20:49:23.758310 systemd[1]: Reached target multi-user.target. Apr 12 20:49:23.759590 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 20:49:23.765311 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 20:49:23.765452 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 20:49:23.765600 systemd[1]: Startup finished in 3.229s (kernel) + 33.668s (initrd) + 18.862s (userspace) = 55.761s. Apr 12 20:49:23.869952 curl[2228]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 20:49:23.870801 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 20:49:33.007104 systemd[1]: Started sshd@3-147.28.150.175:22-139.178.89.65:49024.service. Apr 12 20:49:33.468608 sshd[2232]: Accepted publickey for core from 139.178.89.65 port 49024 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:33.469645 sshd[2232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:33.471943 systemd-logind[2105]: New session 6 of user core. Apr 12 20:49:33.472884 systemd[1]: Started session-6.scope. Apr 12 20:49:33.801296 sshd[2232]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:33.803301 systemd[1]: sshd@3-147.28.150.175:22-139.178.89.65:49024.service: Deactivated successfully. Apr 12 20:49:33.803903 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 20:49:33.804290 systemd-logind[2105]: Session 6 logged out. Waiting for processes to exit. Apr 12 20:49:33.804720 systemd-logind[2105]: Removed session 6. Apr 12 20:49:33.873584 systemd[1]: Started sshd@4-147.28.150.175:22-139.178.89.65:49034.service. Apr 12 20:49:34.330870 sshd[2239]: Accepted publickey for core from 139.178.89.65 port 49034 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:34.331900 sshd[2239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:34.334086 systemd-logind[2105]: New session 7 of user core. Apr 12 20:49:34.334996 systemd[1]: Started session-7.scope. Apr 12 20:49:34.656953 sshd[2239]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:34.659145 systemd[1]: sshd@4-147.28.150.175:22-139.178.89.65:49034.service: Deactivated successfully. Apr 12 20:49:34.659832 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 20:49:34.660251 systemd-logind[2105]: Session 7 logged out. Waiting for processes to exit. Apr 12 20:49:34.660701 systemd-logind[2105]: Removed session 7. Apr 12 20:49:34.731775 systemd[1]: Started sshd@5-147.28.150.175:22-139.178.89.65:49046.service. Apr 12 20:49:35.185911 sshd[2245]: Accepted publickey for core from 139.178.89.65 port 49046 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:35.186891 sshd[2245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:35.189142 systemd-logind[2105]: New session 8 of user core. Apr 12 20:49:35.190063 systemd[1]: Started session-8.scope. Apr 12 20:49:35.519273 sshd[2245]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:35.521799 systemd[1]: sshd@5-147.28.150.175:22-139.178.89.65:49046.service: Deactivated successfully. Apr 12 20:49:35.522492 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 20:49:35.522950 systemd-logind[2105]: Session 8 logged out. Waiting for processes to exit. Apr 12 20:49:35.523456 systemd-logind[2105]: Removed session 8. Apr 12 20:49:35.594108 systemd[1]: Started sshd@6-147.28.150.175:22-139.178.89.65:49060.service. Apr 12 20:49:36.052656 sshd[2251]: Accepted publickey for core from 139.178.89.65 port 49060 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:36.053652 sshd[2251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:36.055824 systemd-logind[2105]: New session 9 of user core. Apr 12 20:49:36.056744 systemd[1]: Started session-9.scope. Apr 12 20:49:36.319485 sudo[2254]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 20:49:36.319677 sudo[2254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:49:36.328683 dbus-daemon[2074]: avc: received setenforce notice (enforcing=1) Apr 12 20:49:36.330508 sudo[2254]: pam_unix(sudo:session): session closed for user root Apr 12 20:49:36.403427 sshd[2251]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:36.406409 systemd[1]: sshd@6-147.28.150.175:22-139.178.89.65:49060.service: Deactivated successfully. Apr 12 20:49:36.407223 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 20:49:36.407731 systemd-logind[2105]: Session 9 logged out. Waiting for processes to exit. Apr 12 20:49:36.408329 systemd-logind[2105]: Removed session 9. Apr 12 20:49:36.481073 systemd[1]: Started sshd@7-147.28.150.175:22-139.178.89.65:49062.service. Apr 12 20:49:36.950100 sshd[2258]: Accepted publickey for core from 139.178.89.65 port 49062 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:36.951188 sshd[2258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:36.953429 systemd-logind[2105]: New session 10 of user core. Apr 12 20:49:36.954417 systemd[1]: Started session-10.scope. Apr 12 20:49:37.213852 sudo[2262]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 20:49:37.214043 sudo[2262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:49:37.216143 sudo[2262]: pam_unix(sudo:session): session closed for user root Apr 12 20:49:37.220182 sudo[2261]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 20:49:37.220376 sudo[2261]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:49:37.227456 systemd[1]: Stopping audit-rules.service... Apr 12 20:49:37.228000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:49:37.228720 auditctl[2265]: No rules Apr 12 20:49:37.228892 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 20:49:37.229040 systemd[1]: Stopped audit-rules.service. Apr 12 20:49:37.230585 systemd[1]: Starting audit-rules.service... Apr 12 20:49:37.234006 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 20:49:37.234151 kernel: audit: type=1305 audit(1712954977.228:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:49:37.245432 augenrules[2282]: No rules Apr 12 20:49:37.245994 systemd[1]: Finished audit-rules.service. Apr 12 20:49:37.246675 sudo[2261]: pam_unix(sudo:session): session closed for user root Apr 12 20:49:37.228000 audit[2265]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd47ba050 a2=420 a3=0 items=0 ppid=1 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:37.279593 kernel: audit: type=1300 audit(1712954977.228:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd47ba050 a2=420 a3=0 items=0 ppid=1 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:37.279654 kernel: audit: type=1327 audit(1712954977.228:169): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:49:37.228000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:49:37.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.310837 kernel: audit: type=1131 audit(1712954977.228:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.310855 kernel: audit: type=1130 audit(1712954977.245:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.319718 sshd[2258]: pam_unix(sshd:session): session closed for user core Apr 12 20:49:37.321702 systemd[1]: sshd@7-147.28.150.175:22-139.178.89.65:49062.service: Deactivated successfully. Apr 12 20:49:37.322341 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 20:49:37.322758 systemd-logind[2105]: Session 10 logged out. Waiting for processes to exit. Apr 12 20:49:37.323191 systemd-logind[2105]: Removed session 10. Apr 12 20:49:37.246000 audit[2261]: USER_END pid=2261 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.358232 kernel: audit: type=1106 audit(1712954977.246:172): pid=2261 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.358272 kernel: audit: type=1104 audit(1712954977.246:173): pid=2261 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.246000 audit[2261]: CRED_DISP pid=2261 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.319000 audit[2258]: USER_END pid=2258 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.394882 systemd[1]: Started sshd@8-147.28.150.175:22-139.178.89.65:49068.service. Apr 12 20:49:37.437554 kernel: audit: type=1106 audit(1712954977.319:174): pid=2258 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.437664 kernel: audit: type=1104 audit(1712954977.319:175): pid=2258 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.319000 audit[2258]: CRED_DISP pid=2258 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.150.175:22-139.178.89.65:49062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.519390 kernel: audit: type=1131 audit(1712954977.321:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.150.175:22-139.178.89.65:49062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.150.175:22-139.178.89.65:49068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:37.847000 audit[2288]: USER_ACCT pid=2288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.848269 sshd[2288]: Accepted publickey for core from 139.178.89.65 port 49068 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 20:49:37.848000 audit[2288]: CRED_ACQ pid=2288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.848000 audit[2288]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7cd8eb0 a2=3 a3=1 items=0 ppid=1 pid=2288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:37.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:49:37.849242 sshd[2288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:49:37.851510 systemd-logind[2105]: New session 11 of user core. Apr 12 20:49:37.852445 systemd[1]: Started session-11.scope. Apr 12 20:49:37.854000 audit[2288]: USER_START pid=2288 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:37.855000 audit[2290]: CRED_ACQ pid=2290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:49:38.107000 audit[2291]: USER_ACCT pid=2291 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:38.107598 sudo[2291]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 20:49:38.107000 audit[2291]: CRED_REFR pid=2291 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:38.107796 sudo[2291]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:49:38.108000 audit[2291]: USER_START pid=2291 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:49:38.776254 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 20:49:38.782031 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 20:49:38.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:38.782295 systemd[1]: Reached target network-online.target. Apr 12 20:49:38.783679 systemd[1]: Starting docker.service... Apr 12 20:49:38.835524 env[2313]: time="2024-04-12T20:49:38.835482200Z" level=info msg="Starting up" Apr 12 20:49:38.836994 env[2313]: time="2024-04-12T20:49:38.836973240Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:49:38.836994 env[2313]: time="2024-04-12T20:49:38.836993680Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:49:38.837047 env[2313]: time="2024-04-12T20:49:38.837013920Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:49:38.837047 env[2313]: time="2024-04-12T20:49:38.837024600Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:49:38.838854 env[2313]: time="2024-04-12T20:49:38.838834400Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:49:38.838883 env[2313]: time="2024-04-12T20:49:38.838854080Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:49:38.838883 env[2313]: time="2024-04-12T20:49:38.838869000Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:49:38.838883 env[2313]: time="2024-04-12T20:49:38.838879520Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:49:38.849681 env[2313]: time="2024-04-12T20:49:38.849662000Z" level=info msg="Loading containers: start." Apr 12 20:49:38.892000 audit[2368]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.892000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffcb8eb390 a2=0 a3=1 items=0 ppid=2313 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 20:49:38.894000 audit[2370]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.894000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd3ca3400 a2=0 a3=1 items=0 ppid=2313 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 20:49:38.895000 audit[2372]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.895000 audit[2372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffee2a8b60 a2=0 a3=1 items=0 ppid=2313 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 20:49:38.897000 audit[2374]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.897000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff33ceb20 a2=0 a3=1 items=0 ppid=2313 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.897000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 20:49:38.899000 audit[2376]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.899000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff79751f0 a2=0 a3=1 items=0 ppid=2313 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.899000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 20:49:38.925000 audit[2381]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.925000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd36c1e70 a2=0 a3=1 items=0 ppid=2313 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 20:49:38.932000 audit[2383]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.932000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd285c7a0 a2=0 a3=1 items=0 ppid=2313 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 20:49:38.934000 audit[2385]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.934000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd0c40000 a2=0 a3=1 items=0 ppid=2313 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 20:49:38.935000 audit[2387]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.935000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff710a6c0 a2=0 a3=1 items=0 ppid=2313 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:49:38.940000 audit[2391]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.940000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff6526380 a2=0 a3=1 items=0 ppid=2313 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:49:38.940000 audit[2392]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.940000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffca85f530 a2=0 a3=1 items=0 ppid=2313 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:49:38.959466 kernel: Initializing XFRM netlink socket Apr 12 20:49:38.984976 env[2313]: time="2024-04-12T20:49:38.984952440Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 20:49:38.985813 systemd-timesyncd[2054]: Network configuration changed, trying to establish connection. Apr 12 20:49:38.998000 audit[2403]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:38.998000 audit[2403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff6bcb240 a2=0 a3=1 items=0 ppid=2313 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:38.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 20:49:39.013000 audit[2406]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.013000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff87485d0 a2=0 a3=1 items=0 ppid=2313 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 20:49:39.016000 audit[2409]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.016000 audit[2409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc0dee820 a2=0 a3=1 items=0 ppid=2313 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.016000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 20:49:39.017000 audit[2411]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.017000 audit[2411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff3273a30 a2=0 a3=1 items=0 ppid=2313 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.017000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 20:49:39.019000 audit[2413]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.019000 audit[2413]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd1c108c0 a2=0 a3=1 items=0 ppid=2313 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.019000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 20:49:39.021000 audit[2415]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.021000 audit[2415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd61e9c90 a2=0 a3=1 items=0 ppid=2313 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 20:49:39.023000 audit[2417]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.023000 audit[2417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffeb22d850 a2=0 a3=1 items=0 ppid=2313 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 20:49:39.032000 audit[2420]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.032000 audit[2420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffccda24e0 a2=0 a3=1 items=0 ppid=2313 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 20:49:39.034000 audit[2422]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.034000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffef664330 a2=0 a3=1 items=0 ppid=2313 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.034000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 20:49:39.035000 audit[2424]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.035000 audit[2424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffcd20d7b0 a2=0 a3=1 items=0 ppid=2313 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.035000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 20:49:39.037000 audit[2426]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.037000 audit[2426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffdb3cfe0 a2=0 a3=1 items=0 ppid=2313 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 20:49:39.038327 systemd-networkd[1943]: docker0: Link UP Apr 12 20:49:39.042000 audit[2430]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.042000 audit[2430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd65b13d0 a2=0 a3=1 items=0 ppid=2313 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.042000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:49:39.043000 audit[2431]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:49:39.043000 audit[2431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdd442090 a2=0 a3=1 items=0 ppid=2313 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:49:39.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 20:49:39.044293 env[2313]: time="2024-04-12T20:49:39.044275320Z" level=info msg="Loading containers: done." Apr 12 20:49:39.057015 env[2313]: time="2024-04-12T20:49:39.056991440Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 20:49:39.057094 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2140366801-merged.mount: Deactivated successfully. Apr 12 20:49:39.057176 env[2313]: time="2024-04-12T20:49:39.057132040Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 20:49:39.057243 env[2313]: time="2024-04-12T20:49:39.057231120Z" level=info msg="Daemon has completed initialization" Apr 12 20:49:39.066387 systemd[1]: Started docker.service. Apr 12 20:49:39.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:39.070269 env[2313]: time="2024-04-12T20:49:39.070166680Z" level=info msg="API listen on /run/docker.sock" Apr 12 20:49:39.086076 systemd[1]: Reloading. Apr 12 20:49:39.120013 /usr/lib/systemd/system-generators/torcx-generator[2492]: time="2024-04-12T20:49:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:49:39.120036 /usr/lib/systemd/system-generators/torcx-generator[2492]: time="2024-04-12T20:49:39Z" level=info msg="torcx already run" Apr 12 20:49:39.189383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:49:39.189396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:49:39.205685 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:49:39.233757 systemd-timesyncd[2054]: Contacted time server [2603:c020:0:8369:feed:feed:feed:feed]:123 (2.flatcar.pool.ntp.org). Apr 12 20:49:39.233804 systemd-timesyncd[2054]: Initial clock synchronization to Fri 2024-04-12 20:49:38.884323 UTC. Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.262000 audit: BPF prog-id=34 op=LOAD Apr 12 20:49:39.263000 audit: BPF prog-id=28 op=UNLOAD Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.263000 audit: BPF prog-id=35 op=LOAD Apr 12 20:49:39.263000 audit: BPF prog-id=23 op=UNLOAD Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit: BPF prog-id=36 op=LOAD Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.264000 audit: BPF prog-id=37 op=LOAD Apr 12 20:49:39.264000 audit: BPF prog-id=21 op=UNLOAD Apr 12 20:49:39.264000 audit: BPF prog-id=22 op=UNLOAD Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit: BPF prog-id=38 op=LOAD Apr 12 20:49:39.265000 audit: BPF prog-id=29 op=UNLOAD Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit: BPF prog-id=39 op=LOAD Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit: BPF prog-id=40 op=LOAD Apr 12 20:49:39.266000 audit: BPF prog-id=30 op=UNLOAD Apr 12 20:49:39.266000 audit: BPF prog-id=31 op=UNLOAD Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit: BPF prog-id=41 op=LOAD Apr 12 20:49:39.267000 audit: BPF prog-id=32 op=UNLOAD Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit: BPF prog-id=42 op=LOAD Apr 12 20:49:39.267000 audit: BPF prog-id=18 op=UNLOAD Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit: BPF prog-id=43 op=LOAD Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit: BPF prog-id=44 op=LOAD Apr 12 20:49:39.268000 audit: BPF prog-id=19 op=UNLOAD Apr 12 20:49:39.268000 audit: BPF prog-id=20 op=UNLOAD Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.268000 audit: BPF prog-id=45 op=LOAD Apr 12 20:49:39.268000 audit: BPF prog-id=27 op=UNLOAD Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit: BPF prog-id=46 op=LOAD Apr 12 20:49:39.269000 audit: BPF prog-id=24 op=UNLOAD Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit: BPF prog-id=47 op=LOAD Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:39.270000 audit: BPF prog-id=48 op=LOAD Apr 12 20:49:39.270000 audit: BPF prog-id=25 op=UNLOAD Apr 12 20:49:39.270000 audit: BPF prog-id=26 op=UNLOAD Apr 12 20:49:39.279151 systemd[1]: Started kubelet.service. Apr 12 20:49:39.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:39.344465 kubelet[2547]: E0412 20:49:39.344422 2547 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 20:49:39.346588 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 20:49:39.346721 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 20:49:39.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:49:39.610591 env[2117]: time="2024-04-12T20:49:39.610511960Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 20:49:40.085401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3080557472.mount: Deactivated successfully. Apr 12 20:49:42.335259 env[2117]: time="2024-04-12T20:49:42.335218091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:42.336270 env[2117]: time="2024-04-12T20:49:42.336243433Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:42.337799 env[2117]: time="2024-04-12T20:49:42.337776111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:42.341784 env[2117]: time="2024-04-12T20:49:42.341765551Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:42.342472 env[2117]: time="2024-04-12T20:49:42.342441883Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de\"" Apr 12 20:49:42.352460 env[2117]: time="2024-04-12T20:49:42.352438894Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 20:49:44.758652 env[2117]: time="2024-04-12T20:49:44.758613473Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:44.759613 env[2117]: time="2024-04-12T20:49:44.759587375Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:44.761216 env[2117]: time="2024-04-12T20:49:44.761191018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:44.762710 env[2117]: time="2024-04-12T20:49:44.762684046Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:44.763400 env[2117]: time="2024-04-12T20:49:44.763372329Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8\"" Apr 12 20:49:44.773336 env[2117]: time="2024-04-12T20:49:44.773316326Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 20:49:46.255661 env[2117]: time="2024-04-12T20:49:46.255626064Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:46.256504 env[2117]: time="2024-04-12T20:49:46.256477685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:46.257963 env[2117]: time="2024-04-12T20:49:46.257942961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:46.259451 env[2117]: time="2024-04-12T20:49:46.259433415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:46.260346 env[2117]: time="2024-04-12T20:49:46.260314997Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687\"" Apr 12 20:49:46.269883 env[2117]: time="2024-04-12T20:49:46.269864472Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 20:49:47.201969 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2214557579.mount: Deactivated successfully. Apr 12 20:49:48.036660 env[2117]: time="2024-04-12T20:49:48.036616742Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.037295 env[2117]: time="2024-04-12T20:49:48.037268102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.038289 env[2117]: time="2024-04-12T20:49:48.038272328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.039204 env[2117]: time="2024-04-12T20:49:48.039188495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.039678 env[2117]: time="2024-04-12T20:49:48.039646835Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 20:49:48.049910 env[2117]: time="2024-04-12T20:49:48.049886213Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 20:49:48.314605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3248423339.mount: Deactivated successfully. Apr 12 20:49:48.315347 env[2117]: time="2024-04-12T20:49:48.315317444Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.316000 env[2117]: time="2024-04-12T20:49:48.315982870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.317371 env[2117]: time="2024-04-12T20:49:48.317345123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.318414 env[2117]: time="2024-04-12T20:49:48.318389143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:48.318934 env[2117]: time="2024-04-12T20:49:48.318911311Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 20:49:48.328658 env[2117]: time="2024-04-12T20:49:48.328636678Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 20:49:48.554098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3205405049.mount: Deactivated successfully. Apr 12 20:49:49.569831 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 20:49:49.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.570093 systemd[1]: Stopped kubelet.service. Apr 12 20:49:49.573696 systemd[1]: Started kubelet.service. Apr 12 20:49:49.581700 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 20:49:49.581828 kernel: audit: type=1130 audit(1712954989.568:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.615303 kubelet[2715]: E0412 20:49:49.615274 2715 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 20:49:49.617534 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 20:49:49.617652 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 20:49:49.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.660067 kernel: audit: type=1131 audit(1712954989.568:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.660108 kernel: audit: type=1130 audit(1712954989.573:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:49.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:49:49.737831 kernel: audit: type=1131 audit(1712954989.616:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 20:49:53.261940 env[2117]: time="2024-04-12T20:49:53.261894994Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:53.262966 env[2117]: time="2024-04-12T20:49:53.262937788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:53.264737 env[2117]: time="2024-04-12T20:49:53.264710919Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:53.268609 env[2117]: time="2024-04-12T20:49:53.268581865Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:53.269447 env[2117]: time="2024-04-12T20:49:53.269424173Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Apr 12 20:49:53.279544 env[2117]: time="2024-04-12T20:49:53.279521361Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 20:49:53.552214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount466538810.mount: Deactivated successfully. Apr 12 20:49:54.284310 env[2117]: time="2024-04-12T20:49:54.284271005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:54.285066 env[2117]: time="2024-04-12T20:49:54.285036139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:54.286153 env[2117]: time="2024-04-12T20:49:54.286129846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:54.287198 env[2117]: time="2024-04-12T20:49:54.287183981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:49:54.287720 env[2117]: time="2024-04-12T20:49:54.287694401Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Apr 12 20:49:56.021539 update_engine[2107]: I0412 20:49:56.021499 2107 update_attempter.cc:509] Updating boot flags... Apr 12 20:49:59.056276 systemd[1]: Stopped kubelet.service. Apr 12 20:49:59.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:59.071690 systemd[1]: Reloading. Apr 12 20:49:59.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:59.135906 kernel: audit: type=1130 audit(1712954999.054:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:59.135944 kernel: audit: type=1131 audit(1712954999.054:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:59.149816 /usr/lib/systemd/system-generators/torcx-generator[2942]: time="2024-04-12T20:49:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:49:59.149840 /usr/lib/systemd/system-generators/torcx-generator[2942]: time="2024-04-12T20:49:59Z" level=info msg="torcx already run" Apr 12 20:49:59.219220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:49:59.219232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:49:59.235424 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.369155 kernel: audit: type=1400 audit(1712954999.290:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.369250 kernel: audit: type=1400 audit(1712954999.290:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.369302 kernel: audit: type=1400 audit(1712954999.290:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446088 kernel: audit: type=1400 audit(1712954999.290:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446125 kernel: audit: type=1400 audit(1712954999.290:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.523298 kernel: audit: type=1400 audit(1712954999.290:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.523394 kernel: audit: type=1400 audit(1712954999.290:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.523468 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.329000 audit: BPF prog-id=49 op=LOAD Apr 12 20:49:59.329000 audit: BPF prog-id=34 op=UNLOAD Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.367000 audit: BPF prog-id=50 op=LOAD Apr 12 20:49:59.367000 audit: BPF prog-id=35 op=UNLOAD Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit: BPF prog-id=51 op=LOAD Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.445000 audit: BPF prog-id=52 op=LOAD Apr 12 20:49:59.445000 audit: BPF prog-id=36 op=UNLOAD Apr 12 20:49:59.445000 audit: BPF prog-id=37 op=UNLOAD Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit: BPF prog-id=53 op=LOAD Apr 12 20:49:59.484000 audit: BPF prog-id=38 op=UNLOAD Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.522000 audit: BPF prog-id=54 op=LOAD Apr 12 20:49:59.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.572000 audit: BPF prog-id=55 op=LOAD Apr 12 20:49:59.572000 audit: BPF prog-id=39 op=UNLOAD Apr 12 20:49:59.572000 audit: BPF prog-id=40 op=UNLOAD Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit: BPF prog-id=56 op=LOAD Apr 12 20:49:59.573000 audit: BPF prog-id=41 op=UNLOAD Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit: BPF prog-id=57 op=LOAD Apr 12 20:49:59.574000 audit: BPF prog-id=42 op=UNLOAD Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit: BPF prog-id=58 op=LOAD Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit: BPF prog-id=59 op=LOAD Apr 12 20:49:59.574000 audit: BPF prog-id=43 op=UNLOAD Apr 12 20:49:59.574000 audit: BPF prog-id=44 op=UNLOAD Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit: BPF prog-id=60 op=LOAD Apr 12 20:49:59.575000 audit: BPF prog-id=45 op=UNLOAD Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.575000 audit: BPF prog-id=61 op=LOAD Apr 12 20:49:59.575000 audit: BPF prog-id=46 op=UNLOAD Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit: BPF prog-id=62 op=LOAD Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:49:59.576000 audit: BPF prog-id=63 op=LOAD Apr 12 20:49:59.576000 audit: BPF prog-id=47 op=UNLOAD Apr 12 20:49:59.576000 audit: BPF prog-id=48 op=UNLOAD Apr 12 20:49:59.589616 systemd[1]: Started kubelet.service. Apr 12 20:49:59.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:49:59.625483 kubelet[2997]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:49:59.625483 kubelet[2997]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 20:49:59.625483 kubelet[2997]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:49:59.625888 kubelet[2997]: I0412 20:49:59.625540 2997 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 20:50:00.214690 kubelet[2997]: I0412 20:50:00.214667 2997 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 20:50:00.214690 kubelet[2997]: I0412 20:50:00.214689 2997 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 20:50:00.215918 kubelet[2997]: I0412 20:50:00.215900 2997 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 20:50:00.220418 kubelet[2997]: I0412 20:50:00.220401 2997 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 20:50:00.220747 kubelet[2997]: E0412 20:50:00.220731 2997 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.28.150.175:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.230565 kubelet[2997]: W0412 20:50:00.230544 2997 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 20:50:00.237325 kubelet[2997]: I0412 20:50:00.237311 2997 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 20:50:00.237505 kubelet[2997]: I0412 20:50:00.237496 2997 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 20:50:00.237645 kubelet[2997]: I0412 20:50:00.237634 2997 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 20:50:00.237718 kubelet[2997]: I0412 20:50:00.237653 2997 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 20:50:00.237718 kubelet[2997]: I0412 20:50:00.237663 2997 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 20:50:00.237764 kubelet[2997]: I0412 20:50:00.237747 2997 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:50:00.237962 kubelet[2997]: I0412 20:50:00.237955 2997 kubelet.go:393] "Attempting to sync node with API server" Apr 12 20:50:00.237985 kubelet[2997]: I0412 20:50:00.237973 2997 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 20:50:00.238010 kubelet[2997]: I0412 20:50:00.237989 2997 kubelet.go:309] "Adding apiserver pod source" Apr 12 20:50:00.238010 kubelet[2997]: I0412 20:50:00.238001 2997 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 20:50:00.238368 kubelet[2997]: W0412 20:50:00.238336 2997 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.28.150.175:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-aaaf4a72a0&limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.238393 kubelet[2997]: E0412 20:50:00.238385 2997 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.28.150.175:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-aaaf4a72a0&limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.238520 kubelet[2997]: W0412 20:50:00.238488 2997 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.28.150.175:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.238550 kubelet[2997]: E0412 20:50:00.238531 2997 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.28.150.175:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.238777 kubelet[2997]: I0412 20:50:00.238766 2997 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 20:50:00.239130 kubelet[2997]: W0412 20:50:00.239121 2997 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 20:50:00.240976 kubelet[2997]: I0412 20:50:00.240963 2997 server.go:1232] "Started kubelet" Apr 12 20:50:00.241038 kubelet[2997]: I0412 20:50:00.241021 2997 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 20:50:00.241162 kubelet[2997]: I0412 20:50:00.241145 2997 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 20:50:00.241258 kubelet[2997]: E0412 20:50:00.241241 2997 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 20:50:00.241287 kubelet[2997]: E0412 20:50:00.241270 2997 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 20:50:00.241424 kubelet[2997]: I0412 20:50:00.241411 2997 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 20:50:00.241595 kubelet[2997]: E0412 20:50:00.241485 2997 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-aaaf4a72a0.17c5a37f41972263", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-aaaf4a72a0", UID:"ci-3510.3.3-a-aaaf4a72a0", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-aaaf4a72a0"}, FirstTimestamp:time.Date(2024, time.April, 12, 20, 50, 0, 240939619, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 20, 50, 0, 240939619, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-aaaf4a72a0"}': 'Post "https://147.28.150.175:6443/api/v1/namespaces/default/events": dial tcp 147.28.150.175:6443: connect: connection refused'(may retry after sleeping) Apr 12 20:50:00.240000 audit[2997]: AVC avc: denied { mac_admin } for pid=2997 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.240000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:50:00.240000 audit[2997]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009dab10 a1=4000c54b70 a2=40009daae0 a3=25 items=0 ppid=1 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.240000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:50:00.240000 audit[2997]: AVC avc: denied { mac_admin } for pid=2997 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.240000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:50:00.240000 audit[2997]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009b42e0 a1=4000c54b88 a2=40009daba0 a3=25 items=0 ppid=1 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.240000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:50:00.242260 kubelet[2997]: I0412 20:50:00.242017 2997 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 20:50:00.242260 kubelet[2997]: I0412 20:50:00.242047 2997 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 20:50:00.242260 kubelet[2997]: I0412 20:50:00.242105 2997 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 20:50:00.242260 kubelet[2997]: I0412 20:50:00.242191 2997 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 20:50:00.242260 kubelet[2997]: I0412 20:50:00.242235 2997 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 20:50:00.242360 kubelet[2997]: I0412 20:50:00.242302 2997 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 20:50:00.242360 kubelet[2997]: I0412 20:50:00.242307 2997 server.go:462] "Adding debug handlers to kubelet server" Apr 12 20:50:00.242754 kubelet[2997]: W0412 20:50:00.242718 2997 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.28.150.175:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.242782 kubelet[2997]: E0412 20:50:00.242750 2997 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.150.175:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-aaaf4a72a0?timeout=10s\": dial tcp 147.28.150.175:6443: connect: connection refused" interval="200ms" Apr 12 20:50:00.242782 kubelet[2997]: E0412 20:50:00.242765 2997 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.28.150.175:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.243000 audit[3028]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.243000 audit[3028]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff6e1c3a0 a2=0 a3=1 items=0 ppid=2997 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 20:50:00.244000 audit[3029]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.244000 audit[3029]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0a62010 a2=0 a3=1 items=0 ppid=2997 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 20:50:00.245000 audit[3031]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.245000 audit[3031]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffddb1b630 a2=0 a3=1 items=0 ppid=2997 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:50:00.247000 audit[3033]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.247000 audit[3033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9666590 a2=0 a3=1 items=0 ppid=2997 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:50:00.253000 audit[3036]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.253000 audit[3036]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff63bc1d0 a2=0 a3=1 items=0 ppid=2997 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 20:50:00.254957 kubelet[2997]: I0412 20:50:00.254942 2997 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 20:50:00.254000 audit[3038]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:00.254000 audit[3038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc0059ea0 a2=0 a3=1 items=0 ppid=2997 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 20:50:00.255888 kubelet[2997]: I0412 20:50:00.255878 2997 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 20:50:00.255911 kubelet[2997]: I0412 20:50:00.255902 2997 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 20:50:00.254000 audit[3039]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.254000 audit[3039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8eac240 a2=0 a3=1 items=0 ppid=2997 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 20:50:00.256023 kubelet[2997]: I0412 20:50:00.255917 2997 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 20:50:00.256023 kubelet[2997]: E0412 20:50:00.255960 2997 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 20:50:00.256279 kubelet[2997]: W0412 20:50:00.256245 2997 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://147.28.150.175:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.256304 kubelet[2997]: E0412 20:50:00.256291 2997 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.28.150.175:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.28.150.175:6443: connect: connection refused Apr 12 20:50:00.255000 audit[3040]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:00.255000 audit[3040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6ef6c60 a2=0 a3=1 items=0 ppid=2997 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 20:50:00.255000 audit[3041]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=3041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.255000 audit[3041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe86221b0 a2=0 a3=1 items=0 ppid=2997 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 20:50:00.256000 audit[3042]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=3042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:00.256000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe3ae85d0 a2=0 a3=1 items=0 ppid=2997 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 20:50:00.256000 audit[3043]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:00.256000 audit[3043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff300f330 a2=0 a3=1 items=0 ppid=2997 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 20:50:00.257000 audit[3044]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:00.257000 audit[3044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcc8f6600 a2=0 a3=1 items=0 ppid=2997 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 20:50:00.304033 kubelet[2997]: I0412 20:50:00.304015 2997 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 20:50:00.304033 kubelet[2997]: I0412 20:50:00.304032 2997 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 20:50:00.304094 kubelet[2997]: I0412 20:50:00.304047 2997 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:50:00.304615 kubelet[2997]: I0412 20:50:00.304604 2997 policy_none.go:49] "None policy: Start" Apr 12 20:50:00.305011 kubelet[2997]: I0412 20:50:00.304996 2997 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 20:50:00.305047 kubelet[2997]: I0412 20:50:00.305025 2997 state_mem.go:35] "Initializing new in-memory state store" Apr 12 20:50:00.308425 systemd[1]: Created slice kubepods.slice. Apr 12 20:50:00.311890 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 20:50:00.314280 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 20:50:00.324988 kubelet[2997]: I0412 20:50:00.324969 2997 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 20:50:00.323000 audit[2997]: AVC avc: denied { mac_admin } for pid=2997 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.323000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:50:00.323000 audit[2997]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e93140 a1=40009d80a8 a2=4000e93110 a3=25 items=0 ppid=1 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.323000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:50:00.325148 kubelet[2997]: I0412 20:50:00.325023 2997 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 20:50:00.325198 kubelet[2997]: I0412 20:50:00.325189 2997 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 20:50:00.325559 kubelet[2997]: E0412 20:50:00.325545 2997 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-aaaf4a72a0\" not found" Apr 12 20:50:00.344370 kubelet[2997]: I0412 20:50:00.344349 2997 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.344649 kubelet[2997]: E0412 20:50:00.344633 2997 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.28.150.175:6443/api/v1/nodes\": dial tcp 147.28.150.175:6443: connect: connection refused" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.356898 kubelet[2997]: I0412 20:50:00.356876 2997 topology_manager.go:215] "Topology Admit Handler" podUID="72ee7f90470b6d01a66e2040049540f0" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.358265 kubelet[2997]: I0412 20:50:00.358253 2997 topology_manager.go:215] "Topology Admit Handler" podUID="29d331da40e0647a61e387849c25763a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.359719 kubelet[2997]: I0412 20:50:00.359701 2997 topology_manager.go:215] "Topology Admit Handler" podUID="9752cdefe4858d1a8bad0fe8b9c3d448" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.363011 systemd[1]: Created slice kubepods-burstable-pod72ee7f90470b6d01a66e2040049540f0.slice. Apr 12 20:50:00.385547 systemd[1]: Created slice kubepods-burstable-pod29d331da40e0647a61e387849c25763a.slice. Apr 12 20:50:00.402220 systemd[1]: Created slice kubepods-burstable-pod9752cdefe4858d1a8bad0fe8b9c3d448.slice. Apr 12 20:50:00.443642 kubelet[2997]: I0412 20:50:00.443619 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/72ee7f90470b6d01a66e2040049540f0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"72ee7f90470b6d01a66e2040049540f0\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443682 kubelet[2997]: I0412 20:50:00.443673 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443707 kubelet[2997]: E0412 20:50:00.443693 2997 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.150.175:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-aaaf4a72a0?timeout=10s\": dial tcp 147.28.150.175:6443: connect: connection refused" interval="400ms" Apr 12 20:50:00.443740 kubelet[2997]: I0412 20:50:00.443731 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443791 kubelet[2997]: I0412 20:50:00.443785 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443813 kubelet[2997]: I0412 20:50:00.443807 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443837 kubelet[2997]: I0412 20:50:00.443831 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443860 kubelet[2997]: I0412 20:50:00.443852 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/72ee7f90470b6d01a66e2040049540f0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"72ee7f90470b6d01a66e2040049540f0\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443883 kubelet[2997]: I0412 20:50:00.443872 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9752cdefe4858d1a8bad0fe8b9c3d448-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"9752cdefe4858d1a8bad0fe8b9c3d448\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.443905 kubelet[2997]: I0412 20:50:00.443891 2997 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/72ee7f90470b6d01a66e2040049540f0-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"72ee7f90470b6d01a66e2040049540f0\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.546892 kubelet[2997]: I0412 20:50:00.546819 2997 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.547121 kubelet[2997]: E0412 20:50:00.547108 2997 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.28.150.175:6443/api/v1/nodes\": dial tcp 147.28.150.175:6443: connect: connection refused" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.685220 env[2117]: time="2024-04-12T20:50:00.685159028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-aaaf4a72a0,Uid:72ee7f90470b6d01a66e2040049540f0,Namespace:kube-system,Attempt:0,}" Apr 12 20:50:00.701759 env[2117]: time="2024-04-12T20:50:00.701727575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0,Uid:29d331da40e0647a61e387849c25763a,Namespace:kube-system,Attempt:0,}" Apr 12 20:50:00.704150 env[2117]: time="2024-04-12T20:50:00.704130293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-aaaf4a72a0,Uid:9752cdefe4858d1a8bad0fe8b9c3d448,Namespace:kube-system,Attempt:0,}" Apr 12 20:50:00.844065 kubelet[2997]: E0412 20:50:00.844038 2997 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.150.175:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-aaaf4a72a0?timeout=10s\": dial tcp 147.28.150.175:6443: connect: connection refused" interval="800ms" Apr 12 20:50:00.924535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount611836749.mount: Deactivated successfully. Apr 12 20:50:00.925214 env[2117]: time="2024-04-12T20:50:00.925185235Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.925935 env[2117]: time="2024-04-12T20:50:00.925917575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.926609 env[2117]: time="2024-04-12T20:50:00.926585391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.927575 env[2117]: time="2024-04-12T20:50:00.927554494Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.929559 env[2117]: time="2024-04-12T20:50:00.929534414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.932279 env[2117]: time="2024-04-12T20:50:00.932254490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.935094 env[2117]: time="2024-04-12T20:50:00.935073945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.936577 env[2117]: time="2024-04-12T20:50:00.936553541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.937315 env[2117]: time="2024-04-12T20:50:00.937293738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.937951 env[2117]: time="2024-04-12T20:50:00.937935553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.938581 env[2117]: time="2024-04-12T20:50:00.938566441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.939268 env[2117]: time="2024-04-12T20:50:00.939245742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:00.945952 env[2117]: time="2024-04-12T20:50:00.945904442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:00.945952 env[2117]: time="2024-04-12T20:50:00.945941490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:00.945999 env[2117]: time="2024-04-12T20:50:00.945951499Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:00.945999 env[2117]: time="2024-04-12T20:50:00.945931201Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:00.945999 env[2117]: time="2024-04-12T20:50:00.945964460Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:00.945999 env[2117]: time="2024-04-12T20:50:00.945976145Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:00.946148 env[2117]: time="2024-04-12T20:50:00.946128882Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b00a75e5a8c75c8ac8b53d23d4e84d9a3bd9081abbde8bce04822da334e58ef4 pid=3067 runtime=io.containerd.runc.v2 Apr 12 20:50:00.946235 env[2117]: time="2024-04-12T20:50:00.946206327Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d571c72432186d8bfb39a0c179075c1abb10fa7695069d8ec4a02d1e921ef8a4 pid=3068 runtime=io.containerd.runc.v2 Apr 12 20:50:00.946515 env[2117]: time="2024-04-12T20:50:00.946478143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:00.946545 env[2117]: time="2024-04-12T20:50:00.946511961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:00.946545 env[2117]: time="2024-04-12T20:50:00.946521971Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:00.946646 env[2117]: time="2024-04-12T20:50:00.946628647Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/221a2f398943cbf74bb10bc01ebe659de162f16f643aa4df82aedbab4ab1eff1 pid=3071 runtime=io.containerd.runc.v2 Apr 12 20:50:00.949119 kubelet[2997]: I0412 20:50:00.949103 2997 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.949460 kubelet[2997]: E0412 20:50:00.949443 2997 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.28.150.175:6443/api/v1/nodes\": dial tcp 147.28.150.175:6443: connect: connection refused" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:00.957402 systemd[1]: Started cri-containerd-221a2f398943cbf74bb10bc01ebe659de162f16f643aa4df82aedbab4ab1eff1.scope. Apr 12 20:50:00.958743 systemd[1]: Started cri-containerd-b00a75e5a8c75c8ac8b53d23d4e84d9a3bd9081abbde8bce04822da334e58ef4.scope. Apr 12 20:50:00.960253 systemd[1]: Started cri-containerd-d571c72432186d8bfb39a0c179075c1abb10fa7695069d8ec4a02d1e921ef8a4.scope. Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit: BPF prog-id=64 op=LOAD Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3068 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435373163373234333231383664386266623339613063313739303735 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3068 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435373163373234333231383664386266623339613063313739303735 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.975000 audit: BPF prog-id=65 op=LOAD Apr 12 20:50:00.975000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3068 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435373163373234333231383664386266623339613063313739303735 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit: BPF prog-id=66 op=LOAD Apr 12 20:50:00.976000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3068 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435373163373234333231383664386266623339613063313739303735 Apr 12 20:50:00.976000 audit: BPF prog-id=66 op=UNLOAD Apr 12 20:50:00.976000 audit: BPF prog-id=65 op=UNLOAD Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit: BPF prog-id=67 op=LOAD Apr 12 20:50:00.976000 audit[3098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3068 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435373163373234333231383664386266623339613063313739303735 Apr 12 20:50:00.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit: BPF prog-id=68 op=LOAD Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3071 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232316132663339383934336362663734626231306263303165626536 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3071 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232316132663339383934336362663734626231306263303165626536 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.976000 audit: BPF prog-id=69 op=LOAD Apr 12 20:50:00.976000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3071 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232316132663339383934336362663734626231306263303165626536 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit: BPF prog-id=70 op=LOAD Apr 12 20:50:00.977000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3071 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232316132663339383934336362663734626231306263303165626536 Apr 12 20:50:00.977000 audit: BPF prog-id=70 op=UNLOAD Apr 12 20:50:00.977000 audit: BPF prog-id=69 op=UNLOAD Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { perfmon } for pid=3099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3099]: AVC avc: denied { bpf } for pid=3099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit: BPF prog-id=71 op=LOAD Apr 12 20:50:00.977000 audit[3099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3071 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232316132663339383934336362663734626231306263303165626536 Apr 12 20:50:00.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit: BPF prog-id=72 op=LOAD Apr 12 20:50:00.977000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.977000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3067 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230306137356535613863373563386163386235336432336434653834 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3067 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230306137356535613863373563386163386235336432336434653834 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit: BPF prog-id=73 op=LOAD Apr 12 20:50:00.978000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3067 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230306137356535613863373563386163386235336432336434653834 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit: BPF prog-id=74 op=LOAD Apr 12 20:50:00.978000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3067 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230306137356535613863373563386163386235336432336434653834 Apr 12 20:50:00.978000 audit: BPF prog-id=74 op=UNLOAD Apr 12 20:50:00.978000 audit: BPF prog-id=73 op=UNLOAD Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:00.978000 audit: BPF prog-id=75 op=LOAD Apr 12 20:50:00.978000 audit[3097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3067 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:00.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230306137356535613863373563386163386235336432336434653834 Apr 12 20:50:00.992190 env[2117]: time="2024-04-12T20:50:00.992162570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-aaaf4a72a0,Uid:72ee7f90470b6d01a66e2040049540f0,Namespace:kube-system,Attempt:0,} returns sandbox id \"d571c72432186d8bfb39a0c179075c1abb10fa7695069d8ec4a02d1e921ef8a4\"" Apr 12 20:50:00.992560 env[2117]: time="2024-04-12T20:50:00.992535201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-aaaf4a72a0,Uid:9752cdefe4858d1a8bad0fe8b9c3d448,Namespace:kube-system,Attempt:0,} returns sandbox id \"221a2f398943cbf74bb10bc01ebe659de162f16f643aa4df82aedbab4ab1eff1\"" Apr 12 20:50:00.994869 env[2117]: time="2024-04-12T20:50:00.994841651Z" level=info msg="CreateContainer within sandbox \"d571c72432186d8bfb39a0c179075c1abb10fa7695069d8ec4a02d1e921ef8a4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 20:50:00.994920 env[2117]: time="2024-04-12T20:50:00.994900473Z" level=info msg="CreateContainer within sandbox \"221a2f398943cbf74bb10bc01ebe659de162f16f643aa4df82aedbab4ab1eff1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 20:50:00.995657 env[2117]: time="2024-04-12T20:50:00.995630221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0,Uid:29d331da40e0647a61e387849c25763a,Namespace:kube-system,Attempt:0,} returns sandbox id \"b00a75e5a8c75c8ac8b53d23d4e84d9a3bd9081abbde8bce04822da334e58ef4\"" Apr 12 20:50:00.997448 env[2117]: time="2024-04-12T20:50:00.997422828Z" level=info msg="CreateContainer within sandbox \"b00a75e5a8c75c8ac8b53d23d4e84d9a3bd9081abbde8bce04822da334e58ef4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 20:50:01.009368 env[2117]: time="2024-04-12T20:50:01.009327897Z" level=info msg="CreateContainer within sandbox \"d571c72432186d8bfb39a0c179075c1abb10fa7695069d8ec4a02d1e921ef8a4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c8defd6eaceb274983c2172e408516839cffae8bc1a0ddb2c9e2407c73740ef9\"" Apr 12 20:50:01.009670 env[2117]: time="2024-04-12T20:50:01.009638115Z" level=info msg="CreateContainer within sandbox \"221a2f398943cbf74bb10bc01ebe659de162f16f643aa4df82aedbab4ab1eff1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8447b737470527e305d16f4c61cc8f62a4a0fc670ee0695d8ab02d6b4f17b6bb\"" Apr 12 20:50:01.009897 env[2117]: time="2024-04-12T20:50:01.009875047Z" level=info msg="StartContainer for \"c8defd6eaceb274983c2172e408516839cffae8bc1a0ddb2c9e2407c73740ef9\"" Apr 12 20:50:01.009977 env[2117]: time="2024-04-12T20:50:01.009957548Z" level=info msg="StartContainer for \"8447b737470527e305d16f4c61cc8f62a4a0fc670ee0695d8ab02d6b4f17b6bb\"" Apr 12 20:50:01.010762 env[2117]: time="2024-04-12T20:50:01.010733771Z" level=info msg="CreateContainer within sandbox \"b00a75e5a8c75c8ac8b53d23d4e84d9a3bd9081abbde8bce04822da334e58ef4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"8c7ef7fae202273051a11564f4405f2da538c86448c27c71185c0fa1f1012ac9\"" Apr 12 20:50:01.011020 env[2117]: time="2024-04-12T20:50:01.011002618Z" level=info msg="StartContainer for \"8c7ef7fae202273051a11564f4405f2da538c86448c27c71185c0fa1f1012ac9\"" Apr 12 20:50:01.023355 systemd[1]: Started cri-containerd-8447b737470527e305d16f4c61cc8f62a4a0fc670ee0695d8ab02d6b4f17b6bb.scope. Apr 12 20:50:01.024542 systemd[1]: Started cri-containerd-c8defd6eaceb274983c2172e408516839cffae8bc1a0ddb2c9e2407c73740ef9.scope. Apr 12 20:50:01.026777 systemd[1]: Started cri-containerd-8c7ef7fae202273051a11564f4405f2da538c86448c27c71185c0fa1f1012ac9.scope. Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit: BPF prog-id=76 op=LOAD Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3071 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343762373337343730353237653330356431366634633631636338 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3071 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343762373337343730353237653330356431366634633631636338 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit: BPF prog-id=77 op=LOAD Apr 12 20:50:01.042000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3071 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343762373337343730353237653330356431366634633631636338 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit: BPF prog-id=78 op=LOAD Apr 12 20:50:01.042000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3071 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343762373337343730353237653330356431366634633631636338 Apr 12 20:50:01.042000 audit: BPF prog-id=78 op=UNLOAD Apr 12 20:50:01.042000 audit: BPF prog-id=77 op=UNLOAD Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { perfmon } for pid=3190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit[3190]: AVC avc: denied { bpf } for pid=3190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.042000 audit: BPF prog-id=79 op=LOAD Apr 12 20:50:01.042000 audit[3190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3071 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343762373337343730353237653330356431366634633631636338 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.043000 audit: BPF prog-id=80 op=LOAD Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3068 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646566643665616365623237343938336332313732653430383531 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3068 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646566643665616365623237343938336332313732653430383531 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit: BPF prog-id=81 op=LOAD Apr 12 20:50:01.044000 audit[3191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3068 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646566643665616365623237343938336332313732653430383531 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit: BPF prog-id=82 op=LOAD Apr 12 20:50:01.044000 audit[3191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3068 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646566643665616365623237343938336332313732653430383531 Apr 12 20:50:01.044000 audit: BPF prog-id=82 op=UNLOAD Apr 12 20:50:01.044000 audit: BPF prog-id=81 op=UNLOAD Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.044000 audit: BPF prog-id=83 op=LOAD Apr 12 20:50:01.044000 audit[3191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3068 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646566643665616365623237343938336332313732653430383531 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit: BPF prog-id=84 op=LOAD Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3067 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863376566376661653230323237333035316131313536346634343035 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3067 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863376566376661653230323237333035316131313536346634343035 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit: BPF prog-id=85 op=LOAD Apr 12 20:50:01.045000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3067 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863376566376661653230323237333035316131313536346634343035 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.045000 audit: BPF prog-id=86 op=LOAD Apr 12 20:50:01.045000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3067 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863376566376661653230323237333035316131313536346634343035 Apr 12 20:50:01.046000 audit: BPF prog-id=86 op=UNLOAD Apr 12 20:50:01.046000 audit: BPF prog-id=85 op=UNLOAD Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:01.046000 audit: BPF prog-id=87 op=LOAD Apr 12 20:50:01.046000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3067 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:01.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863376566376661653230323237333035316131313536346634343035 Apr 12 20:50:01.058216 env[2117]: time="2024-04-12T20:50:01.058180239Z" level=info msg="StartContainer for \"8447b737470527e305d16f4c61cc8f62a4a0fc670ee0695d8ab02d6b4f17b6bb\" returns successfully" Apr 12 20:50:01.058616 env[2117]: time="2024-04-12T20:50:01.058588357Z" level=info msg="StartContainer for \"c8defd6eaceb274983c2172e408516839cffae8bc1a0ddb2c9e2407c73740ef9\" returns successfully" Apr 12 20:50:01.060232 env[2117]: time="2024-04-12T20:50:01.060206029Z" level=info msg="StartContainer for \"8c7ef7fae202273051a11564f4405f2da538c86448c27c71185c0fa1f1012ac9\" returns successfully" Apr 12 20:50:01.751389 kubelet[2997]: I0412 20:50:01.751360 2997 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:02.122000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.122000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.122000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4000d387b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:50:02.122000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400188f280 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:50:02.122000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:02.122000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:02.122000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.122000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4006c1e120 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:50:02.122000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4003943140 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:50:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40035220f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:50:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40069a0300 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:50:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:50:02.148932 kubelet[2997]: E0412 20:50:02.148907 2997 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.3-a-aaaf4a72a0\" not found" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:02.149571 kubelet[2997]: I0412 20:50:02.149558 2997 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:02.198546 kubelet[2997]: E0412 20:50:02.198441 2997 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-aaaf4a72a0.17c5a37f41972263", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-aaaf4a72a0", UID:"ci-3510.3.3-a-aaaf4a72a0", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-aaaf4a72a0"}, FirstTimestamp:time.Date(2024, time.April, 12, 20, 50, 0, 240939619, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 20, 50, 0, 240939619, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-aaaf4a72a0"}': 'namespaces "default" not found' (will not retry!) Apr 12 20:50:02.239607 kubelet[2997]: I0412 20:50:02.239588 2997 apiserver.go:52] "Watching apiserver" Apr 12 20:50:02.242712 kubelet[2997]: I0412 20:50:02.242697 2997 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 20:50:02.264595 kubelet[2997]: E0412 20:50:02.264574 2997 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:02.570000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.570000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:02.570000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400034b4d0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:02.570000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400013e8a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:02.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:02.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:04.653327 systemd[1]: Reloading. Apr 12 20:50:04.684678 /usr/lib/systemd/system-generators/torcx-generator[3421]: time="2024-04-12T20:50:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:50:04.684701 /usr/lib/systemd/system-generators/torcx-generator[3421]: time="2024-04-12T20:50:04Z" level=info msg="torcx already run" Apr 12 20:50:04.753598 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:50:04.753610 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:50:04.769856 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847935 kernel: kauditd_printk_skb: 581 callbacks suppressed Apr 12 20:50:04.848038 kernel: audit: type=1400 audit(1712955004.835:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923877 kernel: audit: type=1400 audit(1712955004.835:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923942 kernel: audit: type=1400 audit(1712955004.835:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.999911 kernel: audit: type=1400 audit(1712955004.835:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.999946 kernel: audit: type=1400 audit(1712955004.835:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.076232 kernel: audit: type=1400 audit(1712955004.835:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.076294 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 20:50:05.076340 kernel: audit: type=1400 audit(1712955004.835:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.125470 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 20:50:05.125522 kernel: audit: type=1400 audit(1712955004.835:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.846000 audit: BPF prog-id=88 op=LOAD Apr 12 20:50:04.846000 audit: BPF prog-id=80 op=UNLOAD Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.884000 audit: BPF prog-id=89 op=LOAD Apr 12 20:50:04.884000 audit: BPF prog-id=49 op=UNLOAD Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.922000 audit: BPF prog-id=90 op=LOAD Apr 12 20:50:04.922000 audit: BPF prog-id=50 op=UNLOAD Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.960000 audit: BPF prog-id=91 op=LOAD Apr 12 20:50:04.960000 audit: BPF prog-id=64 op=UNLOAD Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit: BPF prog-id=92 op=LOAD Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:04.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.036000 audit: BPF prog-id=93 op=LOAD Apr 12 20:50:05.036000 audit: BPF prog-id=51 op=UNLOAD Apr 12 20:50:05.036000 audit: BPF prog-id=52 op=UNLOAD Apr 12 20:50:05.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit: BPF prog-id=94 op=LOAD Apr 12 20:50:05.175000 audit: BPF prog-id=53 op=UNLOAD Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit: BPF prog-id=95 op=LOAD Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit: BPF prog-id=96 op=LOAD Apr 12 20:50:05.176000 audit: BPF prog-id=54 op=UNLOAD Apr 12 20:50:05.176000 audit: BPF prog-id=55 op=UNLOAD Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.176000 audit: BPF prog-id=97 op=LOAD Apr 12 20:50:05.176000 audit: BPF prog-id=56 op=UNLOAD Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit: BPF prog-id=98 op=LOAD Apr 12 20:50:05.177000 audit: BPF prog-id=57 op=UNLOAD Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit: BPF prog-id=99 op=LOAD Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit: BPF prog-id=100 op=LOAD Apr 12 20:50:05.178000 audit: BPF prog-id=58 op=UNLOAD Apr 12 20:50:05.178000 audit: BPF prog-id=59 op=UNLOAD Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.178000 audit: BPF prog-id=101 op=LOAD Apr 12 20:50:05.178000 audit: BPF prog-id=60 op=UNLOAD Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.179000 audit: BPF prog-id=102 op=LOAD Apr 12 20:50:05.179000 audit: BPF prog-id=84 op=UNLOAD Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit: BPF prog-id=103 op=LOAD Apr 12 20:50:05.180000 audit: BPF prog-id=61 op=UNLOAD Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit: BPF prog-id=104 op=LOAD Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.180000 audit: BPF prog-id=105 op=LOAD Apr 12 20:50:05.180000 audit: BPF prog-id=62 op=UNLOAD Apr 12 20:50:05.180000 audit: BPF prog-id=63 op=UNLOAD Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.181000 audit: BPF prog-id=106 op=LOAD Apr 12 20:50:05.181000 audit: BPF prog-id=72 op=UNLOAD Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.182000 audit: BPF prog-id=107 op=LOAD Apr 12 20:50:05.182000 audit: BPF prog-id=76 op=UNLOAD Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.183000 audit: BPF prog-id=108 op=LOAD Apr 12 20:50:05.183000 audit: BPF prog-id=68 op=UNLOAD Apr 12 20:50:05.195763 systemd[1]: Stopping kubelet.service... Apr 12 20:50:05.212646 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 20:50:05.212879 systemd[1]: Stopped kubelet.service. Apr 12 20:50:05.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:05.212927 systemd[1]: kubelet.service: Consumed 1.047s CPU time. Apr 12 20:50:05.214564 systemd[1]: Started kubelet.service. Apr 12 20:50:05.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:05.251594 kubelet[3480]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:50:05.251594 kubelet[3480]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 20:50:05.251594 kubelet[3480]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 20:50:05.251897 kubelet[3480]: I0412 20:50:05.251640 3480 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 20:50:05.255619 kubelet[3480]: I0412 20:50:05.255601 3480 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 20:50:05.255644 kubelet[3480]: I0412 20:50:05.255624 3480 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 20:50:05.255814 kubelet[3480]: I0412 20:50:05.255805 3480 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 20:50:05.257189 kubelet[3480]: I0412 20:50:05.257175 3480 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 20:50:05.258119 kubelet[3480]: I0412 20:50:05.258104 3480 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 20:50:05.266506 kubelet[3480]: W0412 20:50:05.266494 3480 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 20:50:05.274700 kubelet[3480]: I0412 20:50:05.274688 3480 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 20:50:05.274889 kubelet[3480]: I0412 20:50:05.274882 3480 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 20:50:05.275039 kubelet[3480]: I0412 20:50:05.275029 3480 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 20:50:05.275100 kubelet[3480]: I0412 20:50:05.275048 3480 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 20:50:05.275100 kubelet[3480]: I0412 20:50:05.275060 3480 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 20:50:05.275100 kubelet[3480]: I0412 20:50:05.275085 3480 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:50:05.275174 kubelet[3480]: I0412 20:50:05.275167 3480 kubelet.go:393] "Attempting to sync node with API server" Apr 12 20:50:05.275197 kubelet[3480]: I0412 20:50:05.275181 3480 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 20:50:05.275217 kubelet[3480]: I0412 20:50:05.275197 3480 kubelet.go:309] "Adding apiserver pod source" Apr 12 20:50:05.275217 kubelet[3480]: I0412 20:50:05.275206 3480 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 20:50:05.275643 kubelet[3480]: I0412 20:50:05.275623 3480 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 20:50:05.276181 kubelet[3480]: I0412 20:50:05.276169 3480 server.go:1232] "Started kubelet" Apr 12 20:50:05.276241 kubelet[3480]: I0412 20:50:05.276229 3480 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 20:50:05.276269 kubelet[3480]: I0412 20:50:05.276261 3480 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 20:50:05.276427 kubelet[3480]: I0412 20:50:05.276418 3480 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 20:50:05.276516 kubelet[3480]: E0412 20:50:05.276501 3480 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 20:50:05.276539 kubelet[3480]: E0412 20:50:05.276526 3480 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 20:50:05.276000 audit[3480]: AVC avc: denied { mac_admin } for pid=3480 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.276000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:50:05.276000 audit[3480]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c04960 a1=4000c1c5d0 a2=4000c04930 a3=25 items=0 ppid=1 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:05.276000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:50:05.276000 audit[3480]: AVC avc: denied { mac_admin } for pid=3480 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.276000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:50:05.276000 audit[3480]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001324680 a1=4000c1c5e8 a2=4000c049f0 a3=25 items=0 ppid=1 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:05.276000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:50:05.277321 kubelet[3480]: I0412 20:50:05.277071 3480 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 20:50:05.277321 kubelet[3480]: I0412 20:50:05.277101 3480 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 20:50:05.277321 kubelet[3480]: I0412 20:50:05.277121 3480 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 20:50:05.277321 kubelet[3480]: I0412 20:50:05.277165 3480 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 20:50:05.277321 kubelet[3480]: I0412 20:50:05.277223 3480 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 20:50:05.277428 kubelet[3480]: I0412 20:50:05.277345 3480 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 20:50:05.277491 kubelet[3480]: I0412 20:50:05.277476 3480 server.go:462] "Adding debug handlers to kubelet server" Apr 12 20:50:05.284331 kubelet[3480]: I0412 20:50:05.284312 3480 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 20:50:05.285216 kubelet[3480]: I0412 20:50:05.285207 3480 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 20:50:05.285244 kubelet[3480]: I0412 20:50:05.285230 3480 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 20:50:05.285266 kubelet[3480]: I0412 20:50:05.285247 3480 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 20:50:05.285300 kubelet[3480]: E0412 20:50:05.285290 3480 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 20:50:05.316599 kubelet[3480]: I0412 20:50:05.316575 3480 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 20:50:05.316599 kubelet[3480]: I0412 20:50:05.316596 3480 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 20:50:05.316684 kubelet[3480]: I0412 20:50:05.316614 3480 state_mem.go:36] "Initialized new in-memory state store" Apr 12 20:50:05.316760 kubelet[3480]: I0412 20:50:05.316751 3480 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 20:50:05.316786 kubelet[3480]: I0412 20:50:05.316774 3480 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 20:50:05.316786 kubelet[3480]: I0412 20:50:05.316781 3480 policy_none.go:49] "None policy: Start" Apr 12 20:50:05.317265 kubelet[3480]: I0412 20:50:05.317255 3480 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 20:50:05.317289 kubelet[3480]: I0412 20:50:05.317274 3480 state_mem.go:35] "Initializing new in-memory state store" Apr 12 20:50:05.317431 kubelet[3480]: I0412 20:50:05.317422 3480 state_mem.go:75] "Updated machine memory state" Apr 12 20:50:05.320258 kubelet[3480]: I0412 20:50:05.320241 3480 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 20:50:05.319000 audit[3480]: AVC avc: denied { mac_admin } for pid=3480 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:05.319000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 20:50:05.319000 audit[3480]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001326300 a1=40011bcbd0 a2=40013262d0 a3=25 items=0 ppid=1 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:05.319000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 20:50:05.320431 kubelet[3480]: I0412 20:50:05.320303 3480 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 20:50:05.320507 kubelet[3480]: I0412 20:50:05.320497 3480 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 20:50:05.380630 kubelet[3480]: I0412 20:50:05.380609 3480 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.385920 kubelet[3480]: I0412 20:50:05.385905 3480 topology_manager.go:215] "Topology Admit Handler" podUID="9752cdefe4858d1a8bad0fe8b9c3d448" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.385998 kubelet[3480]: I0412 20:50:05.385990 3480 topology_manager.go:215] "Topology Admit Handler" podUID="72ee7f90470b6d01a66e2040049540f0" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.386040 kubelet[3480]: I0412 20:50:05.386032 3480 topology_manager.go:215] "Topology Admit Handler" podUID="29d331da40e0647a61e387849c25763a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.386276 kubelet[3480]: I0412 20:50:05.386264 3480 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.386343 kubelet[3480]: I0412 20:50:05.386335 3480 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.388858 kubelet[3480]: W0412 20:50:05.388846 3480 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:50:05.389077 kubelet[3480]: W0412 20:50:05.389069 3480 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:50:05.389180 kubelet[3480]: W0412 20:50:05.389165 3480 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:50:05.578456 kubelet[3480]: I0412 20:50:05.578437 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578497 kubelet[3480]: I0412 20:50:05.578472 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/72ee7f90470b6d01a66e2040049540f0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"72ee7f90470b6d01a66e2040049540f0\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578567 kubelet[3480]: I0412 20:50:05.578552 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/72ee7f90470b6d01a66e2040049540f0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"72ee7f90470b6d01a66e2040049540f0\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578671 kubelet[3480]: I0412 20:50:05.578649 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578718 kubelet[3480]: I0412 20:50:05.578706 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578761 kubelet[3480]: I0412 20:50:05.578746 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9752cdefe4858d1a8bad0fe8b9c3d448-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"9752cdefe4858d1a8bad0fe8b9c3d448\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578804 kubelet[3480]: I0412 20:50:05.578781 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/72ee7f90470b6d01a66e2040049540f0-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"72ee7f90470b6d01a66e2040049540f0\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578826 kubelet[3480]: I0412 20:50:05.578820 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:05.578851 kubelet[3480]: I0412 20:50:05.578846 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/29d331da40e0647a61e387849c25763a-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0\" (UID: \"29d331da40e0647a61e387849c25763a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:06.275966 kubelet[3480]: I0412 20:50:06.275932 3480 apiserver.go:52] "Watching apiserver" Apr 12 20:50:06.293496 kubelet[3480]: W0412 20:50:06.293474 3480 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 20:50:06.293553 kubelet[3480]: E0412 20:50:06.293523 3480 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-aaaf4a72a0\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:06.305131 kubelet[3480]: I0412 20:50:06.305110 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-aaaf4a72a0" podStartSLOduration=1.305073644 podCreationTimestamp="2024-04-12 20:50:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:50:06.304978973 +0000 UTC m=+1.086853841" watchObservedRunningTime="2024-04-12 20:50:06.305073644 +0000 UTC m=+1.086948512" Apr 12 20:50:06.311825 kubelet[3480]: I0412 20:50:06.311805 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-aaaf4a72a0" podStartSLOduration=1.311773667 podCreationTimestamp="2024-04-12 20:50:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:50:06.311686185 +0000 UTC m=+1.093561053" watchObservedRunningTime="2024-04-12 20:50:06.311773667 +0000 UTC m=+1.093648535" Apr 12 20:50:06.317325 kubelet[3480]: I0412 20:50:06.317307 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-aaaf4a72a0" podStartSLOduration=1.31727955 podCreationTimestamp="2024-04-12 20:50:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:50:06.317212561 +0000 UTC m=+1.099087429" watchObservedRunningTime="2024-04-12 20:50:06.31727955 +0000 UTC m=+1.099154418" Apr 12 20:50:06.388859 kubelet[3480]: I0412 20:50:06.378380 3480 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 20:50:09.681357 sudo[2291]: pam_unix(sudo:session): session closed for user root Apr 12 20:50:09.679000 audit[2291]: USER_END pid=2291 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:50:09.680000 audit[2291]: CRED_DISP pid=2291 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:50:09.752653 sshd[2288]: pam_unix(sshd:session): session closed for user core Apr 12 20:50:09.751000 audit[2288]: USER_END pid=2288 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:50:09.751000 audit[2288]: CRED_DISP pid=2288 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 20:50:09.754766 systemd[1]: sshd@8-147.28.150.175:22-139.178.89.65:49068.service: Deactivated successfully. Apr 12 20:50:09.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.150.175:22-139.178.89.65:49068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:50:09.755473 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 20:50:09.755720 systemd[1]: session-11.scope: Consumed 10.337s CPU time. Apr 12 20:50:09.756019 systemd-logind[2105]: Session 11 logged out. Waiting for processes to exit. Apr 12 20:50:09.756537 systemd-logind[2105]: Removed session 11. Apr 12 20:50:16.994000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=524900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 20:50:17.006292 kernel: kauditd_printk_skb: 255 callbacks suppressed Apr 12 20:50:17.006471 kernel: audit: type=1400 audit(1712955016.994:948): avc: denied { watch } for pid=3223 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=524900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 20:50:16.994000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000553b00 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.113565 kernel: audit: type=1300 audit(1712955016.994:948): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000553b00 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.113633 kernel: audit: type=1327 audit(1712955016.994:948): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:16.994000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:17.044000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.208627 kernel: audit: type=1400 audit(1712955017.044:949): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.208650 kernel: audit: type=1300 audit(1712955017.044:949): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001286b40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.044000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001286b40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:17.318013 kernel: audit: type=1327 audit(1712955017.044:949): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:17.045000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.361766 kernel: audit: type=1400 audit(1712955017.045:950): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.045000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001286ba0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.419834 kernel: audit: type=1300 audit(1712955017.045:950): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001286ba0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:17.472790 kernel: audit: type=1327 audit(1712955017.045:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.517308 kernel: audit: type=1400 audit(1712955017.046:951): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400174c040 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:50:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001893120 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:50:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:50:18.995375 kubelet[3480]: I0412 20:50:18.995344 3480 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 20:50:18.995763 env[2117]: time="2024-04-12T20:50:18.995728377Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 20:50:18.995938 kubelet[3480]: I0412 20:50:18.995905 3480 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 20:50:19.958476 kubelet[3480]: I0412 20:50:19.958353 3480 topology_manager.go:215] "Topology Admit Handler" podUID="93c30fbe-1a0c-40a9-8554-cc6b574897f6" podNamespace="kube-system" podName="kube-proxy-qnxxb" Apr 12 20:50:19.962238 systemd[1]: Created slice kubepods-besteffort-pod93c30fbe_1a0c_40a9_8554_cc6b574897f6.slice. Apr 12 20:50:20.065895 kubelet[3480]: I0412 20:50:20.065867 3480 topology_manager.go:215] "Topology Admit Handler" podUID="e2df4200-d53e-40a1-a459-185a6e2a23d2" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-jmvzv" Apr 12 20:50:20.069652 systemd[1]: Created slice kubepods-besteffort-pode2df4200_d53e_40a1_a459_185a6e2a23d2.slice. Apr 12 20:50:20.140599 kubelet[3480]: I0412 20:50:20.140574 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/93c30fbe-1a0c-40a9-8554-cc6b574897f6-kube-proxy\") pod \"kube-proxy-qnxxb\" (UID: \"93c30fbe-1a0c-40a9-8554-cc6b574897f6\") " pod="kube-system/kube-proxy-qnxxb" Apr 12 20:50:20.140748 kubelet[3480]: I0412 20:50:20.140737 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/93c30fbe-1a0c-40a9-8554-cc6b574897f6-lib-modules\") pod \"kube-proxy-qnxxb\" (UID: \"93c30fbe-1a0c-40a9-8554-cc6b574897f6\") " pod="kube-system/kube-proxy-qnxxb" Apr 12 20:50:20.140839 kubelet[3480]: I0412 20:50:20.140826 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l5q46\" (UniqueName: \"kubernetes.io/projected/93c30fbe-1a0c-40a9-8554-cc6b574897f6-kube-api-access-l5q46\") pod \"kube-proxy-qnxxb\" (UID: \"93c30fbe-1a0c-40a9-8554-cc6b574897f6\") " pod="kube-system/kube-proxy-qnxxb" Apr 12 20:50:20.140883 kubelet[3480]: I0412 20:50:20.140874 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/93c30fbe-1a0c-40a9-8554-cc6b574897f6-xtables-lock\") pod \"kube-proxy-qnxxb\" (UID: \"93c30fbe-1a0c-40a9-8554-cc6b574897f6\") " pod="kube-system/kube-proxy-qnxxb" Apr 12 20:50:20.241031 kubelet[3480]: I0412 20:50:20.240971 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6pqbh\" (UniqueName: \"kubernetes.io/projected/e2df4200-d53e-40a1-a459-185a6e2a23d2-kube-api-access-6pqbh\") pod \"tigera-operator-6bfc79cb9c-jmvzv\" (UID: \"e2df4200-d53e-40a1-a459-185a6e2a23d2\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-jmvzv" Apr 12 20:50:20.241173 kubelet[3480]: I0412 20:50:20.241162 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e2df4200-d53e-40a1-a459-185a6e2a23d2-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-jmvzv\" (UID: \"e2df4200-d53e-40a1-a459-185a6e2a23d2\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-jmvzv" Apr 12 20:50:20.279365 env[2117]: time="2024-04-12T20:50:20.279319210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qnxxb,Uid:93c30fbe-1a0c-40a9-8554-cc6b574897f6,Namespace:kube-system,Attempt:0,}" Apr 12 20:50:20.287075 env[2117]: time="2024-04-12T20:50:20.287031705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:20.287075 env[2117]: time="2024-04-12T20:50:20.287071071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:20.287157 env[2117]: time="2024-04-12T20:50:20.287083872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:20.287205 env[2117]: time="2024-04-12T20:50:20.287186847Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f2b856eb6cba4a73423855849d3fa33079d1e5edada43accdedf609d08325f1 pid=3894 runtime=io.containerd.runc.v2 Apr 12 20:50:20.297649 systemd[1]: Started cri-containerd-3f2b856eb6cba4a73423855849d3fa33079d1e5edada43accdedf609d08325f1.scope. Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.307000 audit: BPF prog-id=109 op=LOAD Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3894 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366326238353665623663626134613733343233383535383439643366 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3894 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366326238353665623663626134613733343233383535383439643366 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit: BPF prog-id=110 op=LOAD Apr 12 20:50:20.308000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3894 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366326238353665623663626134613733343233383535383439643366 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit: BPF prog-id=111 op=LOAD Apr 12 20:50:20.308000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3894 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366326238353665623663626134613733343233383535383439643366 Apr 12 20:50:20.308000 audit: BPF prog-id=111 op=UNLOAD Apr 12 20:50:20.308000 audit: BPF prog-id=110 op=UNLOAD Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.308000 audit: BPF prog-id=112 op=LOAD Apr 12 20:50:20.308000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3894 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366326238353665623663626134613733343233383535383439643366 Apr 12 20:50:20.317745 env[2117]: time="2024-04-12T20:50:20.317710902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qnxxb,Uid:93c30fbe-1a0c-40a9-8554-cc6b574897f6,Namespace:kube-system,Attempt:0,} returns sandbox id \"3f2b856eb6cba4a73423855849d3fa33079d1e5edada43accdedf609d08325f1\"" Apr 12 20:50:20.319974 env[2117]: time="2024-04-12T20:50:20.319936658Z" level=info msg="CreateContainer within sandbox \"3f2b856eb6cba4a73423855849d3fa33079d1e5edada43accdedf609d08325f1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 20:50:20.327338 env[2117]: time="2024-04-12T20:50:20.327301944Z" level=info msg="CreateContainer within sandbox \"3f2b856eb6cba4a73423855849d3fa33079d1e5edada43accdedf609d08325f1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0732a7703d0b914a2577132b0be3bce6c4121d7310cb0e1f6869f423493954fb\"" Apr 12 20:50:20.327672 env[2117]: time="2024-04-12T20:50:20.327649073Z" level=info msg="StartContainer for \"0732a7703d0b914a2577132b0be3bce6c4121d7310cb0e1f6869f423493954fb\"" Apr 12 20:50:20.340684 systemd[1]: Started cri-containerd-0732a7703d0b914a2577132b0be3bce6c4121d7310cb0e1f6869f423493954fb.scope. Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3894 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333261373730336430623931346132353737313332623062653362 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.355000 audit: BPF prog-id=113 op=LOAD Apr 12 20:50:20.355000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3894 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333261373730336430623931346132353737313332623062653362 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit: BPF prog-id=114 op=LOAD Apr 12 20:50:20.356000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3894 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333261373730336430623931346132353737313332623062653362 Apr 12 20:50:20.356000 audit: BPF prog-id=114 op=UNLOAD Apr 12 20:50:20.356000 audit: BPF prog-id=113 op=UNLOAD Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.356000 audit: BPF prog-id=115 op=LOAD Apr 12 20:50:20.356000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3894 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037333261373730336430623931346132353737313332623062653362 Apr 12 20:50:20.366326 env[2117]: time="2024-04-12T20:50:20.366294441Z" level=info msg="StartContainer for \"0732a7703d0b914a2577132b0be3bce6c4121d7310cb0e1f6869f423493954fb\" returns successfully" Apr 12 20:50:20.372243 env[2117]: time="2024-04-12T20:50:20.372218602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-jmvzv,Uid:e2df4200-d53e-40a1-a459-185a6e2a23d2,Namespace:tigera-operator,Attempt:0,}" Apr 12 20:50:20.380213 env[2117]: time="2024-04-12T20:50:20.380167771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:20.380242 env[2117]: time="2024-04-12T20:50:20.380208656Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:20.380242 env[2117]: time="2024-04-12T20:50:20.380218818Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:20.380352 env[2117]: time="2024-04-12T20:50:20.380333794Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9822fc16389f6ddd980a8f8958ded91c8b113f0fab55dfa726eaa3fd49db560 pid=3974 runtime=io.containerd.runc.v2 Apr 12 20:50:20.389391 systemd[1]: Started cri-containerd-d9822fc16389f6ddd980a8f8958ded91c8b113f0fab55dfa726eaa3fd49db560.scope. Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit: BPF prog-id=116 op=LOAD Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3974 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383232666331363338396636646464393830613866383935386465 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3974 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383232666331363338396636646464393830613866383935386465 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.403000 audit: BPF prog-id=117 op=LOAD Apr 12 20:50:20.403000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3974 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383232666331363338396636646464393830613866383935386465 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit: BPF prog-id=118 op=LOAD Apr 12 20:50:20.404000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3974 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383232666331363338396636646464393830613866383935386465 Apr 12 20:50:20.404000 audit: BPF prog-id=118 op=UNLOAD Apr 12 20:50:20.404000 audit: BPF prog-id=117 op=UNLOAD Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:20.404000 audit: BPF prog-id=119 op=LOAD Apr 12 20:50:20.404000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3974 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383232666331363338396636646464393830613866383935386465 Apr 12 20:50:20.419427 env[2117]: time="2024-04-12T20:50:20.419380419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-jmvzv,Uid:e2df4200-d53e-40a1-a459-185a6e2a23d2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d9822fc16389f6ddd980a8f8958ded91c8b113f0fab55dfa726eaa3fd49db560\"" Apr 12 20:50:20.420693 env[2117]: time="2024-04-12T20:50:20.420670882Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 20:50:20.433545 kubelet[3480]: I0412 20:50:20.433529 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qnxxb" podStartSLOduration=1.433482622 podCreationTimestamp="2024-04-12 20:50:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:50:20.433201462 +0000 UTC m=+15.215076330" watchObservedRunningTime="2024-04-12 20:50:20.433482622 +0000 UTC m=+15.215357490" Apr 12 20:50:20.455000 audit[4046]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=4046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.455000 audit[4046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9cd1b30 a2=0 a3=1 items=0 ppid=3947 pid=4046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 20:50:20.455000 audit[4047]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=4047 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.455000 audit[4047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc945e060 a2=0 a3=1 items=0 ppid=3947 pid=4047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 20:50:20.456000 audit[4048]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.456000 audit[4048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcc0f850 a2=0 a3=1 items=0 ppid=3947 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 20:50:20.456000 audit[4049]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=4049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.456000 audit[4049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd91d1130 a2=0 a3=1 items=0 ppid=3947 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 20:50:20.457000 audit[4053]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=4053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.457000 audit[4053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0eb7440 a2=0 a3=1 items=0 ppid=3947 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 20:50:20.458000 audit[4054]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=4054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.458000 audit[4054]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc558d2e0 a2=0 a3=1 items=0 ppid=3947 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 20:50:20.557000 audit[4055]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.557000 audit[4055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff3616a10 a2=0 a3=1 items=0 ppid=3947 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 20:50:20.559000 audit[4057]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=4057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.559000 audit[4057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcd80fa50 a2=0 a3=1 items=0 ppid=3947 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 20:50:20.562000 audit[4060]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.562000 audit[4060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff5771360 a2=0 a3=1 items=0 ppid=3947 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 20:50:20.563000 audit[4061]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=4061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.563000 audit[4061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3a7fc20 a2=0 a3=1 items=0 ppid=3947 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 20:50:20.565000 audit[4063]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=4063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.565000 audit[4063]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffde465b0 a2=0 a3=1 items=0 ppid=3947 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 20:50:20.566000 audit[4064]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=4064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.566000 audit[4064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6fbc4b0 a2=0 a3=1 items=0 ppid=3947 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 20:50:20.568000 audit[4066]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=4066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.568000 audit[4066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffef0ca5b0 a2=0 a3=1 items=0 ppid=3947 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 20:50:20.571000 audit[4069]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=4069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.571000 audit[4069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff209c280 a2=0 a3=1 items=0 ppid=3947 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 20:50:20.572000 audit[4070]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=4070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.572000 audit[4070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddb68320 a2=0 a3=1 items=0 ppid=3947 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 20:50:20.574000 audit[4072]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=4072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.574000 audit[4072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd4b0b0b0 a2=0 a3=1 items=0 ppid=3947 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 20:50:20.575000 audit[4073]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.575000 audit[4073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd38e5f0 a2=0 a3=1 items=0 ppid=3947 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 20:50:20.577000 audit[4075]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.577000 audit[4075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc751990 a2=0 a3=1 items=0 ppid=3947 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:50:20.580000 audit[4078]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.580000 audit[4078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff4d2ec0 a2=0 a3=1 items=0 ppid=3947 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:50:20.583000 audit[4081]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=4081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.583000 audit[4081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff85c6380 a2=0 a3=1 items=0 ppid=3947 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 20:50:20.584000 audit[4082]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=4082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.584000 audit[4082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeed4ee40 a2=0 a3=1 items=0 ppid=3947 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 20:50:20.586000 audit[4084]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=4084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.586000 audit[4084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe95c1460 a2=0 a3=1 items=0 ppid=3947 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:50:20.589000 audit[4087]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.589000 audit[4087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd74113e0 a2=0 a3=1 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:50:20.590000 audit[4088]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=4088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.590000 audit[4088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdbacaee0 a2=0 a3=1 items=0 ppid=3947 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 20:50:20.592000 audit[4090]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=4090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 20:50:20.592000 audit[4090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffce4a6530 a2=0 a3=1 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 20:50:20.608000 audit[4096]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:20.608000 audit[4096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff57f7380 a2=0 a3=1 items=0 ppid=3947 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:20.648000 audit[4096]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:20.648000 audit[4096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff57f7380 a2=0 a3=1 items=0 ppid=3947 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:20.649000 audit[4101]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=4101 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.649000 audit[4101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd55d3ed0 a2=0 a3=1 items=0 ppid=3947 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 20:50:20.651000 audit[4103]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=4103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.651000 audit[4103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe9f43a70 a2=0 a3=1 items=0 ppid=3947 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 20:50:20.655000 audit[4106]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=4106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.655000 audit[4106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd88e8f90 a2=0 a3=1 items=0 ppid=3947 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 20:50:20.656000 audit[4107]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=4107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.656000 audit[4107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff237400 a2=0 a3=1 items=0 ppid=3947 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 20:50:20.658000 audit[4109]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=4109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.658000 audit[4109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd273a410 a2=0 a3=1 items=0 ppid=3947 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 20:50:20.659000 audit[4110]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=4110 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.659000 audit[4110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4abf260 a2=0 a3=1 items=0 ppid=3947 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 20:50:20.661000 audit[4112]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=4112 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.661000 audit[4112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe64ff350 a2=0 a3=1 items=0 ppid=3947 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 20:50:20.664000 audit[4115]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=4115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.664000 audit[4115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc3452750 a2=0 a3=1 items=0 ppid=3947 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 20:50:20.665000 audit[4116]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=4116 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.665000 audit[4116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff80ce170 a2=0 a3=1 items=0 ppid=3947 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 20:50:20.667000 audit[4118]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.667000 audit[4118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe372f810 a2=0 a3=1 items=0 ppid=3947 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 20:50:20.668000 audit[4119]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=4119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.668000 audit[4119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7b71c70 a2=0 a3=1 items=0 ppid=3947 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 20:50:20.670000 audit[4121]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=4121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.670000 audit[4121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4c682d0 a2=0 a3=1 items=0 ppid=3947 pid=4121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 20:50:20.673000 audit[4124]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=4124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.673000 audit[4124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd05128e0 a2=0 a3=1 items=0 ppid=3947 pid=4124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 20:50:20.675000 audit[4127]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=4127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.675000 audit[4127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe080b480 a2=0 a3=1 items=0 ppid=3947 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 20:50:20.676000 audit[4128]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=4128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.676000 audit[4128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd051c1a0 a2=0 a3=1 items=0 ppid=3947 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 20:50:20.678000 audit[4130]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=4130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.678000 audit[4130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc7e05580 a2=0 a3=1 items=0 ppid=3947 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:50:20.681000 audit[4133]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=4133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.681000 audit[4133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc97e5300 a2=0 a3=1 items=0 ppid=3947 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 20:50:20.682000 audit[4134]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=4134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.682000 audit[4134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff736b2e0 a2=0 a3=1 items=0 ppid=3947 pid=4134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 20:50:20.684000 audit[4136]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=4136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.684000 audit[4136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc35dd520 a2=0 a3=1 items=0 ppid=3947 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 20:50:20.685000 audit[4137]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=4137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.685000 audit[4137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4bbe800 a2=0 a3=1 items=0 ppid=3947 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 20:50:20.687000 audit[4139]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=4139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.687000 audit[4139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd2d4f090 a2=0 a3=1 items=0 ppid=3947 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:50:20.690000 audit[4142]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=4142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 20:50:20.690000 audit[4142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff8364830 a2=0 a3=1 items=0 ppid=3947 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 20:50:20.692000 audit[4144]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=4144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 20:50:20.692000 audit[4144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc946db00 a2=0 a3=1 items=0 ppid=3947 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.692000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:20.693000 audit[4144]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=4144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 20:50:20.693000 audit[4144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc946db00 a2=0 a3=1 items=0 ppid=3947 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:20.693000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:21.488932 env[2117]: time="2024-04-12T20:50:21.488887036Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:21.489702 env[2117]: time="2024-04-12T20:50:21.489677983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:21.491111 env[2117]: time="2024-04-12T20:50:21.491089893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:21.492371 env[2117]: time="2024-04-12T20:50:21.492350542Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:21.493010 env[2117]: time="2024-04-12T20:50:21.492989188Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 20:50:21.494413 env[2117]: time="2024-04-12T20:50:21.494390217Z" level=info msg="CreateContainer within sandbox \"d9822fc16389f6ddd980a8f8958ded91c8b113f0fab55dfa726eaa3fd49db560\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 20:50:21.499338 env[2117]: time="2024-04-12T20:50:21.499309840Z" level=info msg="CreateContainer within sandbox \"d9822fc16389f6ddd980a8f8958ded91c8b113f0fab55dfa726eaa3fd49db560\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"faab6257dca7fa3a6d1db8f05d6925bdecc61360372b0e8b71f51c85961d82ac\"" Apr 12 20:50:21.499678 env[2117]: time="2024-04-12T20:50:21.499650205Z" level=info msg="StartContainer for \"faab6257dca7fa3a6d1db8f05d6925bdecc61360372b0e8b71f51c85961d82ac\"" Apr 12 20:50:21.512626 systemd[1]: Started cri-containerd-faab6257dca7fa3a6d1db8f05d6925bdecc61360372b0e8b71f51c85961d82ac.scope. Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit: BPF prog-id=120 op=LOAD Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3974 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661616236323537646361376661336136643164623866303564363932 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3974 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661616236323537646361376661336136643164623866303564363932 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.524000 audit: BPF prog-id=121 op=LOAD Apr 12 20:50:21.524000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3974 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661616236323537646361376661336136643164623866303564363932 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit: BPF prog-id=122 op=LOAD Apr 12 20:50:21.525000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3974 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661616236323537646361376661336136643164623866303564363932 Apr 12 20:50:21.525000 audit: BPF prog-id=122 op=UNLOAD Apr 12 20:50:21.525000 audit: BPF prog-id=121 op=UNLOAD Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:21.525000 audit: BPF prog-id=123 op=LOAD Apr 12 20:50:21.525000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3974 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661616236323537646361376661336136643164623866303564363932 Apr 12 20:50:21.534489 env[2117]: time="2024-04-12T20:50:21.534452172Z" level=info msg="StartContainer for \"faab6257dca7fa3a6d1db8f05d6925bdecc61360372b0e8b71f51c85961d82ac\" returns successfully" Apr 12 20:50:22.438120 kubelet[3480]: I0412 20:50:22.438094 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-jmvzv" podStartSLOduration=1.365112386 podCreationTimestamp="2024-04-12 20:50:20 +0000 UTC" firstStartedPulling="2024-04-12 20:50:20.420263824 +0000 UTC m=+15.202138652" lastFinishedPulling="2024-04-12 20:50:21.493211338 +0000 UTC m=+16.275086246" observedRunningTime="2024-04-12 20:50:22.437952086 +0000 UTC m=+17.219826914" watchObservedRunningTime="2024-04-12 20:50:22.43805998 +0000 UTC m=+17.219934848" Apr 12 20:50:24.925000 audit[4235]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=4235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:24.937329 kernel: kauditd_printk_skb: 372 callbacks suppressed Apr 12 20:50:24.937546 kernel: audit: type=1325 audit(1712955024.925:1064): table=filter:89 family=2 entries=15 op=nft_register_rule pid=4235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:24.925000 audit[4235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffed65afe0 a2=0 a3=1 items=0 ppid=3947 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.022734 kernel: audit: type=1300 audit(1712955024.925:1064): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffed65afe0 a2=0 a3=1 items=0 ppid=3947 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.022786 kernel: audit: type=1327 audit(1712955024.925:1064): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:24.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:25.050655 kubelet[3480]: I0412 20:50:25.050634 3480 topology_manager.go:215] "Topology Admit Handler" podUID="5a2a516f-fa83-4f77-bbe9-8b524006a2fc" podNamespace="calico-system" podName="calico-typha-556dc78d65-5xz9g" Apr 12 20:50:25.056202 systemd[1]: Created slice kubepods-besteffort-pod5a2a516f_fa83_4f77_bbe9_8b524006a2fc.slice. Apr 12 20:50:24.925000 audit[4235]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=4235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:25.071198 kubelet[3480]: I0412 20:50:25.071173 3480 topology_manager.go:215] "Topology Admit Handler" podUID="fc98a24d-4e66-494a-9ba4-155bce2a89f8" podNamespace="calico-system" podName="calico-node-mp8j6" Apr 12 20:50:25.075084 systemd[1]: Created slice kubepods-besteffort-podfc98a24d_4e66_494a_9ba4_155bce2a89f8.slice. Apr 12 20:50:24.925000 audit[4235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffed65afe0 a2=0 a3=1 items=0 ppid=3947 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.153239 kernel: audit: type=1325 audit(1712955024.925:1065): table=nat:90 family=2 entries=12 op=nft_register_rule pid=4235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:25.153347 kernel: audit: type=1300 audit(1712955024.925:1065): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffed65afe0 a2=0 a3=1 items=0 ppid=3947 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.153393 kernel: audit: type=1327 audit(1712955024.925:1065): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:24.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:25.172897 kubelet[3480]: I0412 20:50:25.172870 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-policysync\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173002 kubelet[3480]: I0412 20:50:25.172924 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fc98a24d-4e66-494a-9ba4-155bce2a89f8-node-certs\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173002 kubelet[3480]: I0412 20:50:25.172991 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-var-lib-calico\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173180 kubelet[3480]: I0412 20:50:25.173032 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nffvd\" (UniqueName: \"kubernetes.io/projected/fc98a24d-4e66-494a-9ba4-155bce2a89f8-kube-api-access-nffvd\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173180 kubelet[3480]: I0412 20:50:25.173119 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fc98a24d-4e66-494a-9ba4-155bce2a89f8-tigera-ca-bundle\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173180 kubelet[3480]: I0412 20:50:25.173156 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-cni-bin-dir\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173270 kubelet[3480]: I0412 20:50:25.173188 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-cni-log-dir\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173270 kubelet[3480]: I0412 20:50:25.173219 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5a2a516f-fa83-4f77-bbe9-8b524006a2fc-tigera-ca-bundle\") pod \"calico-typha-556dc78d65-5xz9g\" (UID: \"5a2a516f-fa83-4f77-bbe9-8b524006a2fc\") " pod="calico-system/calico-typha-556dc78d65-5xz9g" Apr 12 20:50:25.173270 kubelet[3480]: I0412 20:50:25.173240 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r86kh\" (UniqueName: \"kubernetes.io/projected/5a2a516f-fa83-4f77-bbe9-8b524006a2fc-kube-api-access-r86kh\") pod \"calico-typha-556dc78d65-5xz9g\" (UID: \"5a2a516f-fa83-4f77-bbe9-8b524006a2fc\") " pod="calico-system/calico-typha-556dc78d65-5xz9g" Apr 12 20:50:25.173270 kubelet[3480]: I0412 20:50:25.173263 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-xtables-lock\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173365 kubelet[3480]: I0412 20:50:25.173291 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-var-run-calico\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173365 kubelet[3480]: I0412 20:50:25.173312 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-flexvol-driver-host\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173365 kubelet[3480]: I0412 20:50:25.173331 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-lib-modules\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173365 kubelet[3480]: I0412 20:50:25.173360 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fc98a24d-4e66-494a-9ba4-155bce2a89f8-cni-net-dir\") pod \"calico-node-mp8j6\" (UID: \"fc98a24d-4e66-494a-9ba4-155bce2a89f8\") " pod="calico-system/calico-node-mp8j6" Apr 12 20:50:25.173456 kubelet[3480]: I0412 20:50:25.173407 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5a2a516f-fa83-4f77-bbe9-8b524006a2fc-typha-certs\") pod \"calico-typha-556dc78d65-5xz9g\" (UID: \"5a2a516f-fa83-4f77-bbe9-8b524006a2fc\") " pod="calico-system/calico-typha-556dc78d65-5xz9g" Apr 12 20:50:25.178162 kubelet[3480]: I0412 20:50:25.178085 3480 topology_manager.go:215] "Topology Admit Handler" podUID="386139dc-a3a7-41a6-b819-7fdf0822e6a9" podNamespace="calico-system" podName="csi-node-driver-mzv5s" Apr 12 20:50:25.178519 kubelet[3480]: E0412 20:50:25.178499 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mzv5s" podUID="386139dc-a3a7-41a6-b819-7fdf0822e6a9" Apr 12 20:50:25.072000 audit[4237]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=4237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:25.072000 audit[4237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdee2e210 a2=0 a3=1 items=0 ppid=3947 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.267828 kernel: audit: type=1325 audit(1712955025.072:1066): table=filter:91 family=2 entries=16 op=nft_register_rule pid=4237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:25.267908 kernel: audit: type=1300 audit(1712955025.072:1066): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdee2e210 a2=0 a3=1 items=0 ppid=3947 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.267978 kernel: audit: type=1327 audit(1712955025.072:1066): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:25.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:25.278152 kubelet[3480]: E0412 20:50:25.278134 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.278152 kubelet[3480]: W0412 20:50:25.278149 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.278311 kubelet[3480]: E0412 20:50:25.278170 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.278476 kubelet[3480]: E0412 20:50:25.278462 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.278535 kubelet[3480]: W0412 20:50:25.278477 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.278535 kubelet[3480]: E0412 20:50:25.278494 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.279063 kubelet[3480]: E0412 20:50:25.279048 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.279173 kubelet[3480]: W0412 20:50:25.279159 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.279260 kubelet[3480]: E0412 20:50:25.279250 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.279527 kubelet[3480]: E0412 20:50:25.279513 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.279527 kubelet[3480]: W0412 20:50:25.279527 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.279629 kubelet[3480]: E0412 20:50:25.279543 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.283278 kubelet[3480]: E0412 20:50:25.283265 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.283333 kubelet[3480]: W0412 20:50:25.283277 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.283333 kubelet[3480]: E0412 20:50:25.283298 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.283519 kubelet[3480]: E0412 20:50:25.283509 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.283551 kubelet[3480]: W0412 20:50:25.283519 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.283551 kubelet[3480]: E0412 20:50:25.283530 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.298000 audit[4237]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=4237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:25.298000 audit[4237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdee2e210 a2=0 a3=1 items=0 ppid=3947 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:25.327463 kernel: audit: type=1325 audit(1712955025.298:1067): table=nat:92 family=2 entries=12 op=nft_register_rule pid=4237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:25.359086 env[2117]: time="2024-04-12T20:50:25.359042349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-556dc78d65-5xz9g,Uid:5a2a516f-fa83-4f77-bbe9-8b524006a2fc,Namespace:calico-system,Attempt:0,}" Apr 12 20:50:25.367534 env[2117]: time="2024-04-12T20:50:25.367484514Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:25.368674 env[2117]: time="2024-04-12T20:50:25.367522558Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:25.368674 env[2117]: time="2024-04-12T20:50:25.367532919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:25.368674 env[2117]: time="2024-04-12T20:50:25.367717860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f4722d780230050b62214d2dc319899b0f4bcf94120943f9ee1bc9a5a219737 pid=4256 runtime=io.containerd.runc.v2 Apr 12 20:50:25.375113 kubelet[3480]: E0412 20:50:25.375097 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.375113 kubelet[3480]: W0412 20:50:25.375113 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.375198 kubelet[3480]: E0412 20:50:25.375135 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.375198 kubelet[3480]: I0412 20:50:25.375162 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2j8x8\" (UniqueName: \"kubernetes.io/projected/386139dc-a3a7-41a6-b819-7fdf0822e6a9-kube-api-access-2j8x8\") pod \"csi-node-driver-mzv5s\" (UID: \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\") " pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:25.375375 kubelet[3480]: E0412 20:50:25.375364 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.375375 kubelet[3480]: W0412 20:50:25.375374 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.375430 kubelet[3480]: E0412 20:50:25.375389 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.375430 kubelet[3480]: I0412 20:50:25.375407 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/386139dc-a3a7-41a6-b819-7fdf0822e6a9-socket-dir\") pod \"csi-node-driver-mzv5s\" (UID: \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\") " pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:25.375624 kubelet[3480]: E0412 20:50:25.375614 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.375658 kubelet[3480]: W0412 20:50:25.375624 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.375658 kubelet[3480]: E0412 20:50:25.375636 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.375658 kubelet[3480]: I0412 20:50:25.375653 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/386139dc-a3a7-41a6-b819-7fdf0822e6a9-kubelet-dir\") pod \"csi-node-driver-mzv5s\" (UID: \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\") " pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:25.375846 kubelet[3480]: E0412 20:50:25.375836 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.375875 kubelet[3480]: W0412 20:50:25.375845 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.375875 kubelet[3480]: E0412 20:50:25.375860 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.375925 kubelet[3480]: I0412 20:50:25.375879 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/386139dc-a3a7-41a6-b819-7fdf0822e6a9-registration-dir\") pod \"csi-node-driver-mzv5s\" (UID: \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\") " pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:25.376128 kubelet[3480]: E0412 20:50:25.376111 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.376162 kubelet[3480]: W0412 20:50:25.376128 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.376162 kubelet[3480]: E0412 20:50:25.376151 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.376346 kubelet[3480]: E0412 20:50:25.376337 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.376374 kubelet[3480]: W0412 20:50:25.376345 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.376374 kubelet[3480]: E0412 20:50:25.376361 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.376580 kubelet[3480]: E0412 20:50:25.376570 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.376610 kubelet[3480]: W0412 20:50:25.376580 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.376610 kubelet[3480]: E0412 20:50:25.376594 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.376785 kubelet[3480]: E0412 20:50:25.376770 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.376886 kubelet[3480]: W0412 20:50:25.376873 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.376936 env[2117]: time="2024-04-12T20:50:25.376871503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mp8j6,Uid:fc98a24d-4e66-494a-9ba4-155bce2a89f8,Namespace:calico-system,Attempt:0,}" Apr 12 20:50:25.376998 kubelet[3480]: E0412 20:50:25.376988 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.377256 kubelet[3480]: E0412 20:50:25.377240 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.377256 kubelet[3480]: W0412 20:50:25.377254 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.377324 kubelet[3480]: E0412 20:50:25.377273 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.377419 systemd[1]: Started cri-containerd-9f4722d780230050b62214d2dc319899b0f4bcf94120943f9ee1bc9a5a219737.scope. Apr 12 20:50:25.377509 kubelet[3480]: E0412 20:50:25.377500 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.377538 kubelet[3480]: W0412 20:50:25.377509 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.377566 kubelet[3480]: E0412 20:50:25.377545 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.377675 kubelet[3480]: E0412 20:50:25.377665 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.377675 kubelet[3480]: W0412 20:50:25.377674 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.377741 kubelet[3480]: E0412 20:50:25.377708 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.377764 kubelet[3480]: I0412 20:50:25.377743 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/386139dc-a3a7-41a6-b819-7fdf0822e6a9-varrun\") pod \"csi-node-driver-mzv5s\" (UID: \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\") " pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:25.378015 kubelet[3480]: E0412 20:50:25.378002 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.378046 kubelet[3480]: W0412 20:50:25.378015 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.378046 kubelet[3480]: E0412 20:50:25.378033 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.378236 kubelet[3480]: E0412 20:50:25.378228 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.378264 kubelet[3480]: W0412 20:50:25.378236 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.378264 kubelet[3480]: E0412 20:50:25.378250 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.378470 kubelet[3480]: E0412 20:50:25.378456 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.378518 kubelet[3480]: W0412 20:50:25.378470 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.378518 kubelet[3480]: E0412 20:50:25.378481 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.378708 kubelet[3480]: E0412 20:50:25.378699 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.378739 kubelet[3480]: W0412 20:50:25.378708 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.378739 kubelet[3480]: E0412 20:50:25.378719 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.384279 env[2117]: time="2024-04-12T20:50:25.384231630Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:25.384279 env[2117]: time="2024-04-12T20:50:25.384266234Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:25.384326 env[2117]: time="2024-04-12T20:50:25.384276515Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:25.384436 env[2117]: time="2024-04-12T20:50:25.384406129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de pid=4306 runtime=io.containerd.runc.v2 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.391000 audit: BPF prog-id=124 op=LOAD Apr 12 20:50:25.391000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.391000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4256 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966343732326437383032333030353062363232313464326463333139 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4256 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966343732326437383032333030353062363232313464326463333139 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit: BPF prog-id=125 op=LOAD Apr 12 20:50:25.392000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4256 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966343732326437383032333030353062363232313464326463333139 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit: BPF prog-id=126 op=LOAD Apr 12 20:50:25.392000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4256 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966343732326437383032333030353062363232313464326463333139 Apr 12 20:50:25.392000 audit: BPF prog-id=126 op=UNLOAD Apr 12 20:50:25.392000 audit: BPF prog-id=125 op=UNLOAD Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.392000 audit: BPF prog-id=127 op=LOAD Apr 12 20:50:25.392000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4256 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966343732326437383032333030353062363232313464326463333139 Apr 12 20:50:25.394436 systemd[1]: Started cri-containerd-ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de.scope. Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.406000 audit: BPF prog-id=128 op=LOAD Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4306 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313235356133316565326431646430383266366635306636323137 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4306 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313235356133316565326431646430383266366635306636323137 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit: BPF prog-id=129 op=LOAD Apr 12 20:50:25.407000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4306 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313235356133316565326431646430383266366635306636323137 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.407000 audit: BPF prog-id=130 op=LOAD Apr 12 20:50:25.407000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4306 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313235356133316565326431646430383266366635306636323137 Apr 12 20:50:25.407000 audit: BPF prog-id=130 op=UNLOAD Apr 12 20:50:25.408000 audit: BPF prog-id=129 op=UNLOAD Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { perfmon } for pid=4321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit[4321]: AVC avc: denied { bpf } for pid=4321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:25.408000 audit: BPF prog-id=131 op=LOAD Apr 12 20:50:25.408000 audit[4321]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4306 pid=4321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:25.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313235356133316565326431646430383266366635306636323137 Apr 12 20:50:25.409237 env[2117]: time="2024-04-12T20:50:25.408455646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-556dc78d65-5xz9g,Uid:5a2a516f-fa83-4f77-bbe9-8b524006a2fc,Namespace:calico-system,Attempt:0,} returns sandbox id \"9f4722d780230050b62214d2dc319899b0f4bcf94120943f9ee1bc9a5a219737\"" Apr 12 20:50:25.409585 env[2117]: time="2024-04-12T20:50:25.409564687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 20:50:25.415552 env[2117]: time="2024-04-12T20:50:25.415528701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mp8j6,Uid:fc98a24d-4e66-494a-9ba4-155bce2a89f8,Namespace:calico-system,Attempt:0,} returns sandbox id \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\"" Apr 12 20:50:25.479164 kubelet[3480]: E0412 20:50:25.479096 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.479283 kubelet[3480]: W0412 20:50:25.479268 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.479348 kubelet[3480]: E0412 20:50:25.479338 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.479625 kubelet[3480]: E0412 20:50:25.479613 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.479715 kubelet[3480]: W0412 20:50:25.479702 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.479781 kubelet[3480]: E0412 20:50:25.479773 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.480046 kubelet[3480]: E0412 20:50:25.480031 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.480046 kubelet[3480]: W0412 20:50:25.480044 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.480106 kubelet[3480]: E0412 20:50:25.480062 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.480301 kubelet[3480]: E0412 20:50:25.480293 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.480333 kubelet[3480]: W0412 20:50:25.480301 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.480333 kubelet[3480]: E0412 20:50:25.480314 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.480549 kubelet[3480]: E0412 20:50:25.480535 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.480593 kubelet[3480]: W0412 20:50:25.480549 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.480593 kubelet[3480]: E0412 20:50:25.480568 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.480740 kubelet[3480]: E0412 20:50:25.480731 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.480776 kubelet[3480]: W0412 20:50:25.480743 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.480776 kubelet[3480]: E0412 20:50:25.480757 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.480922 kubelet[3480]: E0412 20:50:25.480913 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.480953 kubelet[3480]: W0412 20:50:25.480922 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.480953 kubelet[3480]: E0412 20:50:25.480936 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.481193 kubelet[3480]: E0412 20:50:25.481183 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.481193 kubelet[3480]: W0412 20:50:25.481193 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.481288 kubelet[3480]: E0412 20:50:25.481232 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.481418 kubelet[3480]: E0412 20:50:25.481408 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.481418 kubelet[3480]: W0412 20:50:25.481416 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.481479 kubelet[3480]: E0412 20:50:25.481453 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.481561 kubelet[3480]: E0412 20:50:25.481552 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.481561 kubelet[3480]: W0412 20:50:25.481560 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.481625 kubelet[3480]: E0412 20:50:25.481596 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.481692 kubelet[3480]: E0412 20:50:25.481684 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.481692 kubelet[3480]: W0412 20:50:25.481691 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.481744 kubelet[3480]: E0412 20:50:25.481706 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.481841 kubelet[3480]: E0412 20:50:25.481833 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.481841 kubelet[3480]: W0412 20:50:25.481841 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.481895 kubelet[3480]: E0412 20:50:25.481853 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.481993 kubelet[3480]: E0412 20:50:25.481986 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.481993 kubelet[3480]: W0412 20:50:25.481993 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.482043 kubelet[3480]: E0412 20:50:25.482028 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.482128 kubelet[3480]: E0412 20:50:25.482119 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.482128 kubelet[3480]: W0412 20:50:25.482127 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.482185 kubelet[3480]: E0412 20:50:25.482162 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.482311 kubelet[3480]: E0412 20:50:25.482301 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.482311 kubelet[3480]: W0412 20:50:25.482309 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.482360 kubelet[3480]: E0412 20:50:25.482323 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.482461 kubelet[3480]: E0412 20:50:25.482450 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.482461 kubelet[3480]: W0412 20:50:25.482461 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.482521 kubelet[3480]: E0412 20:50:25.482474 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.482755 kubelet[3480]: E0412 20:50:25.482740 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.483920 kubelet[3480]: W0412 20:50:25.483284 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.483920 kubelet[3480]: E0412 20:50:25.483311 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.484301 kubelet[3480]: E0412 20:50:25.484287 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.484338 kubelet[3480]: W0412 20:50:25.484300 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.484362 kubelet[3480]: E0412 20:50:25.484339 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.484545 kubelet[3480]: E0412 20:50:25.484536 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.484570 kubelet[3480]: W0412 20:50:25.484545 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.484598 kubelet[3480]: E0412 20:50:25.484574 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.484762 kubelet[3480]: E0412 20:50:25.484753 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.484789 kubelet[3480]: W0412 20:50:25.484762 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.484789 kubelet[3480]: E0412 20:50:25.484785 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.484931 kubelet[3480]: E0412 20:50:25.484922 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.484953 kubelet[3480]: W0412 20:50:25.484931 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.484953 kubelet[3480]: E0412 20:50:25.484951 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.485129 kubelet[3480]: E0412 20:50:25.485121 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.485154 kubelet[3480]: W0412 20:50:25.485129 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.485154 kubelet[3480]: E0412 20:50:25.485150 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.485334 kubelet[3480]: E0412 20:50:25.485327 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.485359 kubelet[3480]: W0412 20:50:25.485334 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.485359 kubelet[3480]: E0412 20:50:25.485349 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.485564 kubelet[3480]: E0412 20:50:25.485555 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.485590 kubelet[3480]: W0412 20:50:25.485564 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.485590 kubelet[3480]: E0412 20:50:25.485575 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.485733 kubelet[3480]: E0412 20:50:25.485725 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.485756 kubelet[3480]: W0412 20:50:25.485734 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.485756 kubelet[3480]: E0412 20:50:25.485743 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:25.494829 kubelet[3480]: E0412 20:50:25.494817 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:25.494872 kubelet[3480]: W0412 20:50:25.494829 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:25.494872 kubelet[3480]: E0412 20:50:25.494844 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.355753 env[2117]: time="2024-04-12T20:50:26.355711441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.356461 env[2117]: time="2024-04-12T20:50:26.356433996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.357527 env[2117]: time="2024-04-12T20:50:26.357504068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.358672 env[2117]: time="2024-04-12T20:50:26.358652908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.359123 env[2117]: time="2024-04-12T20:50:26.359105035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 20:50:26.359756 env[2117]: time="2024-04-12T20:50:26.359728340Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 20:50:26.364981 env[2117]: time="2024-04-12T20:50:26.364948964Z" level=info msg="CreateContainer within sandbox \"9f4722d780230050b62214d2dc319899b0f4bcf94120943f9ee1bc9a5a219737\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 20:50:26.370363 env[2117]: time="2024-04-12T20:50:26.370332366Z" level=info msg="CreateContainer within sandbox \"9f4722d780230050b62214d2dc319899b0f4bcf94120943f9ee1bc9a5a219737\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"75ba756df4d454023f43cdd27bf190c13e07ab146f5467082c2bd561492c8cf9\"" Apr 12 20:50:26.370849 env[2117]: time="2024-04-12T20:50:26.370821297Z" level=info msg="StartContainer for \"75ba756df4d454023f43cdd27bf190c13e07ab146f5467082c2bd561492c8cf9\"" Apr 12 20:50:26.383383 systemd[1]: Started cri-containerd-75ba756df4d454023f43cdd27bf190c13e07ab146f5467082c2bd561492c8cf9.scope. Apr 12 20:50:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit: BPF prog-id=132 op=LOAD Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4256 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626137353664663464343534303233663433636464323762663139 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4256 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626137353664663464343534303233663433636464323762663139 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit: BPF prog-id=133 op=LOAD Apr 12 20:50:26.398000 audit[4418]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4256 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626137353664663464343534303233663433636464323762663139 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.398000 audit: BPF prog-id=134 op=LOAD Apr 12 20:50:26.398000 audit[4418]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4256 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626137353664663464343534303233663433636464323762663139 Apr 12 20:50:26.399000 audit: BPF prog-id=134 op=UNLOAD Apr 12 20:50:26.399000 audit: BPF prog-id=133 op=UNLOAD Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { perfmon } for pid=4418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit[4418]: AVC avc: denied { bpf } for pid=4418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:26.399000 audit: BPF prog-id=135 op=LOAD Apr 12 20:50:26.399000 audit[4418]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4256 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:26.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626137353664663464343534303233663433636464323762663139 Apr 12 20:50:26.413537 env[2117]: time="2024-04-12T20:50:26.413505669Z" level=info msg="StartContainer for \"75ba756df4d454023f43cdd27bf190c13e07ab146f5467082c2bd561492c8cf9\" returns successfully" Apr 12 20:50:26.443567 kubelet[3480]: I0412 20:50:26.443541 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-556dc78d65-5xz9g" podStartSLOduration=0.493428754 podCreationTimestamp="2024-04-12 20:50:25 +0000 UTC" firstStartedPulling="2024-04-12 20:50:25.409296018 +0000 UTC m=+20.191170886" lastFinishedPulling="2024-04-12 20:50:26.359297935 +0000 UTC m=+21.141172803" observedRunningTime="2024-04-12 20:50:26.44313404 +0000 UTC m=+21.225008868" watchObservedRunningTime="2024-04-12 20:50:26.443430671 +0000 UTC m=+21.225305539" Apr 12 20:50:26.487627 kubelet[3480]: E0412 20:50:26.487600 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.487627 kubelet[3480]: W0412 20:50:26.487619 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.487739 kubelet[3480]: E0412 20:50:26.487643 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.487859 kubelet[3480]: E0412 20:50:26.487851 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.487883 kubelet[3480]: W0412 20:50:26.487859 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.487883 kubelet[3480]: E0412 20:50:26.487870 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.488109 kubelet[3480]: E0412 20:50:26.488101 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.488135 kubelet[3480]: W0412 20:50:26.488109 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.488135 kubelet[3480]: E0412 20:50:26.488119 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.488315 kubelet[3480]: E0412 20:50:26.488308 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.488340 kubelet[3480]: W0412 20:50:26.488315 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.488340 kubelet[3480]: E0412 20:50:26.488325 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.488531 kubelet[3480]: E0412 20:50:26.488522 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.488554 kubelet[3480]: W0412 20:50:26.488531 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.488554 kubelet[3480]: E0412 20:50:26.488541 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.488675 kubelet[3480]: E0412 20:50:26.488667 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.488675 kubelet[3480]: W0412 20:50:26.488675 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.488718 kubelet[3480]: E0412 20:50:26.488685 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.488908 kubelet[3480]: E0412 20:50:26.488900 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.488930 kubelet[3480]: W0412 20:50:26.488908 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.488930 kubelet[3480]: E0412 20:50:26.488917 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.489090 kubelet[3480]: E0412 20:50:26.489082 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.489116 kubelet[3480]: W0412 20:50:26.489089 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.489116 kubelet[3480]: E0412 20:50:26.489099 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.489301 kubelet[3480]: E0412 20:50:26.489293 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.489327 kubelet[3480]: W0412 20:50:26.489301 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.489327 kubelet[3480]: E0412 20:50:26.489311 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.489507 kubelet[3480]: E0412 20:50:26.489499 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.489507 kubelet[3480]: W0412 20:50:26.489507 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.489558 kubelet[3480]: E0412 20:50:26.489516 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.489654 kubelet[3480]: E0412 20:50:26.489646 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.489677 kubelet[3480]: W0412 20:50:26.489654 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.489677 kubelet[3480]: E0412 20:50:26.489664 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.489854 kubelet[3480]: E0412 20:50:26.489846 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.489877 kubelet[3480]: W0412 20:50:26.489854 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.489877 kubelet[3480]: E0412 20:50:26.489863 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.490096 kubelet[3480]: E0412 20:50:26.490088 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.490118 kubelet[3480]: W0412 20:50:26.490097 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.490118 kubelet[3480]: E0412 20:50:26.490107 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.490299 kubelet[3480]: E0412 20:50:26.490291 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.490322 kubelet[3480]: W0412 20:50:26.490299 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.490322 kubelet[3480]: E0412 20:50:26.490309 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.490536 kubelet[3480]: E0412 20:50:26.490528 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.490559 kubelet[3480]: W0412 20:50:26.490536 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.490559 kubelet[3480]: E0412 20:50:26.490546 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.587668 kubelet[3480]: E0412 20:50:26.587646 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.587668 kubelet[3480]: W0412 20:50:26.587660 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.587758 kubelet[3480]: E0412 20:50:26.587675 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.587881 kubelet[3480]: E0412 20:50:26.587871 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.587881 kubelet[3480]: W0412 20:50:26.587879 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.587950 kubelet[3480]: E0412 20:50:26.587893 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.588115 kubelet[3480]: E0412 20:50:26.588107 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.588143 kubelet[3480]: W0412 20:50:26.588116 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.588143 kubelet[3480]: E0412 20:50:26.588130 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.588319 kubelet[3480]: E0412 20:50:26.588307 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.588345 kubelet[3480]: W0412 20:50:26.588321 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.588345 kubelet[3480]: E0412 20:50:26.588341 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.588524 kubelet[3480]: E0412 20:50:26.588516 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.588552 kubelet[3480]: W0412 20:50:26.588524 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.588552 kubelet[3480]: E0412 20:50:26.588539 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.588718 kubelet[3480]: E0412 20:50:26.588706 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.588741 kubelet[3480]: W0412 20:50:26.588719 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.588741 kubelet[3480]: E0412 20:50:26.588739 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.588878 kubelet[3480]: E0412 20:50:26.588870 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.588904 kubelet[3480]: W0412 20:50:26.588878 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.588904 kubelet[3480]: E0412 20:50:26.588893 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.589027 kubelet[3480]: E0412 20:50:26.589019 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.589049 kubelet[3480]: W0412 20:50:26.589027 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.589049 kubelet[3480]: E0412 20:50:26.589040 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.589198 kubelet[3480]: E0412 20:50:26.589190 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.589223 kubelet[3480]: W0412 20:50:26.589198 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.589223 kubelet[3480]: E0412 20:50:26.589211 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.589460 kubelet[3480]: E0412 20:50:26.589445 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.589484 kubelet[3480]: W0412 20:50:26.589462 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.589506 kubelet[3480]: E0412 20:50:26.589483 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.589633 kubelet[3480]: E0412 20:50:26.589625 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.589658 kubelet[3480]: W0412 20:50:26.589633 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.589658 kubelet[3480]: E0412 20:50:26.589647 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.589805 kubelet[3480]: E0412 20:50:26.589798 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.589828 kubelet[3480]: W0412 20:50:26.589805 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.589849 kubelet[3480]: E0412 20:50:26.589829 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.589945 kubelet[3480]: E0412 20:50:26.589937 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.589970 kubelet[3480]: W0412 20:50:26.589945 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.589970 kubelet[3480]: E0412 20:50:26.589965 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.590143 kubelet[3480]: E0412 20:50:26.590135 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.590165 kubelet[3480]: W0412 20:50:26.590143 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.590165 kubelet[3480]: E0412 20:50:26.590158 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.590356 kubelet[3480]: E0412 20:50:26.590348 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.590380 kubelet[3480]: W0412 20:50:26.590356 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.590380 kubelet[3480]: E0412 20:50:26.590368 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.590581 kubelet[3480]: E0412 20:50:26.590572 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.590605 kubelet[3480]: W0412 20:50:26.590582 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.590605 kubelet[3480]: E0412 20:50:26.590597 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.590813 kubelet[3480]: E0412 20:50:26.590803 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.590836 kubelet[3480]: W0412 20:50:26.590813 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.590836 kubelet[3480]: E0412 20:50:26.590829 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.590978 kubelet[3480]: E0412 20:50:26.590970 3480 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 20:50:26.591003 kubelet[3480]: W0412 20:50:26.590978 3480 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 20:50:26.591003 kubelet[3480]: E0412 20:50:26.590989 3480 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 20:50:26.957813 env[2117]: time="2024-04-12T20:50:26.957775843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.958494 env[2117]: time="2024-04-12T20:50:26.958466635Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.959651 env[2117]: time="2024-04-12T20:50:26.959632677Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.960627 env[2117]: time="2024-04-12T20:50:26.960606058Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:26.961076 env[2117]: time="2024-04-12T20:50:26.961056785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 20:50:26.962348 env[2117]: time="2024-04-12T20:50:26.962321637Z" level=info msg="CreateContainer within sandbox \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 20:50:26.968914 env[2117]: time="2024-04-12T20:50:26.968886882Z" level=info msg="CreateContainer within sandbox \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503\"" Apr 12 20:50:26.969237 env[2117]: time="2024-04-12T20:50:26.969212996Z" level=info msg="StartContainer for \"e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503\"" Apr 12 20:50:26.994314 systemd[1]: Started cri-containerd-e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503.scope. Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4306 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:27.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533663037313865663536333765323532353133666165663863306436 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit: BPF prog-id=136 op=LOAD Apr 12 20:50:27.009000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4306 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:27.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533663037313865663536333765323532353133666165663863306436 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit: BPF prog-id=137 op=LOAD Apr 12 20:50:27.009000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4306 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:27.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533663037313865663536333765323532353133666165663863306436 Apr 12 20:50:27.009000 audit: BPF prog-id=137 op=UNLOAD Apr 12 20:50:27.009000 audit: BPF prog-id=136 op=UNLOAD Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { perfmon } for pid=4519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit[4519]: AVC avc: denied { bpf } for pid=4519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:27.009000 audit: BPF prog-id=138 op=LOAD Apr 12 20:50:27.009000 audit[4519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4306 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:27.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533663037313865663536333765323532353133666165663863306436 Apr 12 20:50:27.019814 env[2117]: time="2024-04-12T20:50:27.019784180Z" level=info msg="StartContainer for \"e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503\" returns successfully" Apr 12 20:50:27.027318 systemd[1]: cri-containerd-e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503.scope: Deactivated successfully. Apr 12 20:50:27.042000 audit: BPF prog-id=138 op=UNLOAD Apr 12 20:50:27.153972 env[2117]: time="2024-04-12T20:50:27.153918263Z" level=info msg="shim disconnected" id=e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503 Apr 12 20:50:27.154124 env[2117]: time="2024-04-12T20:50:27.153972989Z" level=warning msg="cleaning up after shim disconnected" id=e3f0718ef5637e252513faef8c0d6410c3895c95c42ae88294fbe03dd5545503 namespace=k8s.io Apr 12 20:50:27.154124 env[2117]: time="2024-04-12T20:50:27.153988790Z" level=info msg="cleaning up dead shim" Apr 12 20:50:27.160272 env[2117]: time="2024-04-12T20:50:27.160246172Z" level=warning msg="cleanup warnings time=\"2024-04-12T20:50:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4558 runtime=io.containerd.runc.v2\n" Apr 12 20:50:27.285893 kubelet[3480]: E0412 20:50:27.285831 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mzv5s" podUID="386139dc-a3a7-41a6-b819-7fdf0822e6a9" Apr 12 20:50:27.439217 kubelet[3480]: I0412 20:50:27.439199 3480 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 20:50:27.440030 env[2117]: time="2024-04-12T20:50:27.439996519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 20:50:27.719833 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2935170046.mount: Deactivated successfully. Apr 12 20:50:29.286574 kubelet[3480]: E0412 20:50:29.286537 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mzv5s" podUID="386139dc-a3a7-41a6-b819-7fdf0822e6a9" Apr 12 20:50:29.555680 env[2117]: time="2024-04-12T20:50:29.555618578Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:29.556552 env[2117]: time="2024-04-12T20:50:29.556526700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:29.557689 env[2117]: time="2024-04-12T20:50:29.557670323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:29.558655 env[2117]: time="2024-04-12T20:50:29.558635650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:29.559105 env[2117]: time="2024-04-12T20:50:29.559086331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 20:50:29.560913 env[2117]: time="2024-04-12T20:50:29.560891534Z" level=info msg="CreateContainer within sandbox \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 20:50:29.568716 env[2117]: time="2024-04-12T20:50:29.568677477Z" level=info msg="CreateContainer within sandbox \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f\"" Apr 12 20:50:29.569089 env[2117]: time="2024-04-12T20:50:29.569066552Z" level=info msg="StartContainer for \"c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f\"" Apr 12 20:50:29.584655 systemd[1]: Started cri-containerd-c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f.scope. Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4306 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:29.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653834326363313139393030386432316138643662356464616239 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit: BPF prog-id=139 op=LOAD Apr 12 20:50:29.597000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4306 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:29.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653834326363313139393030386432316138643662356464616239 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.597000 audit: BPF prog-id=140 op=LOAD Apr 12 20:50:29.597000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4306 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:29.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653834326363313139393030386432316138643662356464616239 Apr 12 20:50:29.597000 audit: BPF prog-id=140 op=UNLOAD Apr 12 20:50:29.598000 audit: BPF prog-id=139 op=UNLOAD Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:29.598000 audit: BPF prog-id=141 op=LOAD Apr 12 20:50:29.598000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4306 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:29.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334653834326363313139393030386432316138643662356464616239 Apr 12 20:50:29.607915 env[2117]: time="2024-04-12T20:50:29.607882936Z" level=info msg="StartContainer for \"c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f\" returns successfully" Apr 12 20:50:29.895673 systemd[1]: cri-containerd-c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f.scope: Deactivated successfully. Apr 12 20:50:29.911000 audit: BPF prog-id=141 op=UNLOAD Apr 12 20:50:29.940104 kubelet[3480]: I0412 20:50:29.940081 3480 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 20:50:29.952494 kubelet[3480]: I0412 20:50:29.952475 3480 topology_manager.go:215] "Topology Admit Handler" podUID="dc02e469-9777-4ca3-9d95-d669589219b9" podNamespace="kube-system" podName="coredns-5dd5756b68-5g7kd" Apr 12 20:50:29.952767 kubelet[3480]: I0412 20:50:29.952756 3480 topology_manager.go:215] "Topology Admit Handler" podUID="3b4baf9f-2461-4b9d-bfd4-0537e0f65971" podNamespace="kube-system" podName="coredns-5dd5756b68-kl4n4" Apr 12 20:50:29.952942 kubelet[3480]: I0412 20:50:29.952927 3480 topology_manager.go:215] "Topology Admit Handler" podUID="db4c5592-c0b5-4583-a613-9e812d8442b3" podNamespace="calico-system" podName="calico-kube-controllers-797954695c-s9lrd" Apr 12 20:50:29.956827 systemd[1]: Created slice kubepods-burstable-poddc02e469_9777_4ca3_9d95_d669589219b9.slice. Apr 12 20:50:29.960395 systemd[1]: Created slice kubepods-burstable-pod3b4baf9f_2461_4b9d_bfd4_0537e0f65971.slice. Apr 12 20:50:29.964176 systemd[1]: Created slice kubepods-besteffort-poddb4c5592_c0b5_4583_a613_9e812d8442b3.slice. Apr 12 20:50:30.053441 env[2117]: time="2024-04-12T20:50:30.053403305Z" level=info msg="shim disconnected" id=c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f Apr 12 20:50:30.053441 env[2117]: time="2024-04-12T20:50:30.053439988Z" level=warning msg="cleaning up after shim disconnected" id=c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f namespace=k8s.io Apr 12 20:50:30.053441 env[2117]: time="2024-04-12T20:50:30.053448349Z" level=info msg="cleaning up dead shim" Apr 12 20:50:30.059298 env[2117]: time="2024-04-12T20:50:30.059269410Z" level=warning msg="cleanup warnings time=\"2024-04-12T20:50:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4655 runtime=io.containerd.runc.v2\n" Apr 12 20:50:30.108323 kubelet[3480]: I0412 20:50:30.108294 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8x7bn\" (UniqueName: \"kubernetes.io/projected/db4c5592-c0b5-4583-a613-9e812d8442b3-kube-api-access-8x7bn\") pod \"calico-kube-controllers-797954695c-s9lrd\" (UID: \"db4c5592-c0b5-4583-a613-9e812d8442b3\") " pod="calico-system/calico-kube-controllers-797954695c-s9lrd" Apr 12 20:50:30.108405 kubelet[3480]: I0412 20:50:30.108335 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tbpbq\" (UniqueName: \"kubernetes.io/projected/3b4baf9f-2461-4b9d-bfd4-0537e0f65971-kube-api-access-tbpbq\") pod \"coredns-5dd5756b68-kl4n4\" (UID: \"3b4baf9f-2461-4b9d-bfd4-0537e0f65971\") " pod="kube-system/coredns-5dd5756b68-kl4n4" Apr 12 20:50:30.108405 kubelet[3480]: I0412 20:50:30.108357 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/dc02e469-9777-4ca3-9d95-d669589219b9-config-volume\") pod \"coredns-5dd5756b68-5g7kd\" (UID: \"dc02e469-9777-4ca3-9d95-d669589219b9\") " pod="kube-system/coredns-5dd5756b68-5g7kd" Apr 12 20:50:30.108564 kubelet[3480]: I0412 20:50:30.108541 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/db4c5592-c0b5-4583-a613-9e812d8442b3-tigera-ca-bundle\") pod \"calico-kube-controllers-797954695c-s9lrd\" (UID: \"db4c5592-c0b5-4583-a613-9e812d8442b3\") " pod="calico-system/calico-kube-controllers-797954695c-s9lrd" Apr 12 20:50:30.108598 kubelet[3480]: I0412 20:50:30.108581 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-68qgh\" (UniqueName: \"kubernetes.io/projected/dc02e469-9777-4ca3-9d95-d669589219b9-kube-api-access-68qgh\") pod \"coredns-5dd5756b68-5g7kd\" (UID: \"dc02e469-9777-4ca3-9d95-d669589219b9\") " pod="kube-system/coredns-5dd5756b68-5g7kd" Apr 12 20:50:30.108672 kubelet[3480]: I0412 20:50:30.108657 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3b4baf9f-2461-4b9d-bfd4-0537e0f65971-config-volume\") pod \"coredns-5dd5756b68-kl4n4\" (UID: \"3b4baf9f-2461-4b9d-bfd4-0537e0f65971\") " pod="kube-system/coredns-5dd5756b68-kl4n4" Apr 12 20:50:30.259285 env[2117]: time="2024-04-12T20:50:30.259210920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5g7kd,Uid:dc02e469-9777-4ca3-9d95-d669589219b9,Namespace:kube-system,Attempt:0,}" Apr 12 20:50:30.262813 env[2117]: time="2024-04-12T20:50:30.262785828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-kl4n4,Uid:3b4baf9f-2461-4b9d-bfd4-0537e0f65971,Namespace:kube-system,Attempt:0,}" Apr 12 20:50:30.267254 env[2117]: time="2024-04-12T20:50:30.267229531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-797954695c-s9lrd,Uid:db4c5592-c0b5-4583-a613-9e812d8442b3,Namespace:calico-system,Attempt:0,}" Apr 12 20:50:30.317392 env[2117]: time="2024-04-12T20:50:30.317323128Z" level=error msg="Failed to destroy network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.317647 env[2117]: time="2024-04-12T20:50:30.317613073Z" level=error msg="Failed to destroy network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.317767 env[2117]: time="2024-04-12T20:50:30.317741764Z" level=error msg="encountered an error cleaning up failed sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.317812 env[2117]: time="2024-04-12T20:50:30.317793329Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-797954695c-s9lrd,Uid:db4c5592-c0b5-4583-a613-9e812d8442b3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.317911 env[2117]: time="2024-04-12T20:50:30.317880216Z" level=error msg="Failed to destroy network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.317972 env[2117]: time="2024-04-12T20:50:30.317939701Z" level=error msg="encountered an error cleaning up failed sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318018 env[2117]: time="2024-04-12T20:50:30.317998987Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5g7kd,Uid:dc02e469-9777-4ca3-9d95-d669589219b9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318049 kubelet[3480]: E0412 20:50:30.318002 3480 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318267 kubelet[3480]: E0412 20:50:30.318064 3480 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-797954695c-s9lrd" Apr 12 20:50:30.318267 kubelet[3480]: E0412 20:50:30.318086 3480 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-797954695c-s9lrd" Apr 12 20:50:30.318267 kubelet[3480]: E0412 20:50:30.318132 3480 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318267 kubelet[3480]: E0412 20:50:30.318173 3480 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-5g7kd" Apr 12 20:50:30.318364 env[2117]: time="2024-04-12T20:50:30.318216605Z" level=error msg="encountered an error cleaning up failed sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318364 env[2117]: time="2024-04-12T20:50:30.318260129Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-kl4n4,Uid:3b4baf9f-2461-4b9d-bfd4-0537e0f65971,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318414 kubelet[3480]: E0412 20:50:30.318192 3480 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-5g7kd" Apr 12 20:50:30.318414 kubelet[3480]: E0412 20:50:30.318136 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-797954695c-s9lrd_calico-system(db4c5592-c0b5-4583-a613-9e812d8442b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-797954695c-s9lrd_calico-system(db4c5592-c0b5-4583-a613-9e812d8442b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-797954695c-s9lrd" podUID="db4c5592-c0b5-4583-a613-9e812d8442b3" Apr 12 20:50:30.318414 kubelet[3480]: E0412 20:50:30.318233 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-5g7kd_kube-system(dc02e469-9777-4ca3-9d95-d669589219b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-5g7kd_kube-system(dc02e469-9777-4ca3-9d95-d669589219b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-5g7kd" podUID="dc02e469-9777-4ca3-9d95-d669589219b9" Apr 12 20:50:30.318534 kubelet[3480]: E0412 20:50:30.318383 3480 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.318534 kubelet[3480]: E0412 20:50:30.318414 3480 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-kl4n4" Apr 12 20:50:30.318534 kubelet[3480]: E0412 20:50:30.318432 3480 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-kl4n4" Apr 12 20:50:30.318608 kubelet[3480]: E0412 20:50:30.318487 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-kl4n4_kube-system(3b4baf9f-2461-4b9d-bfd4-0537e0f65971)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-kl4n4_kube-system(3b4baf9f-2461-4b9d-bfd4-0537e0f65971)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-kl4n4" podUID="3b4baf9f-2461-4b9d-bfd4-0537e0f65971" Apr 12 20:50:30.444547 kubelet[3480]: I0412 20:50:30.444522 3480 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:50:30.445037 env[2117]: time="2024-04-12T20:50:30.445016612Z" level=info msg="StopPodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\"" Apr 12 20:50:30.445173 kubelet[3480]: I0412 20:50:30.445160 3480 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:50:30.445552 env[2117]: time="2024-04-12T20:50:30.445533137Z" level=info msg="StopPodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\"" Apr 12 20:50:30.446962 kubelet[3480]: I0412 20:50:30.446950 3480 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:50:30.447091 env[2117]: time="2024-04-12T20:50:30.447071669Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 20:50:30.447312 env[2117]: time="2024-04-12T20:50:30.447292688Z" level=info msg="StopPodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\"" Apr 12 20:50:30.467555 env[2117]: time="2024-04-12T20:50:30.467507350Z" level=error msg="StopPodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" failed" error="failed to destroy network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.467743 kubelet[3480]: E0412 20:50:30.467726 3480 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:50:30.467799 kubelet[3480]: E0412 20:50:30.467791 3480 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884"} Apr 12 20:50:30.467834 kubelet[3480]: E0412 20:50:30.467827 3480 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"db4c5592-c0b5-4583-a613-9e812d8442b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:50:30.467886 kubelet[3480]: E0412 20:50:30.467856 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"db4c5592-c0b5-4583-a613-9e812d8442b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-797954695c-s9lrd" podUID="db4c5592-c0b5-4583-a613-9e812d8442b3" Apr 12 20:50:30.467923 env[2117]: time="2024-04-12T20:50:30.467821338Z" level=error msg="StopPodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" failed" error="failed to destroy network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.467986 kubelet[3480]: E0412 20:50:30.467973 3480 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:50:30.468013 kubelet[3480]: E0412 20:50:30.468004 3480 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024"} Apr 12 20:50:30.468040 kubelet[3480]: E0412 20:50:30.468035 3480 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc02e469-9777-4ca3-9d95-d669589219b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:50:30.468077 kubelet[3480]: E0412 20:50:30.468062 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc02e469-9777-4ca3-9d95-d669589219b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-5g7kd" podUID="dc02e469-9777-4ca3-9d95-d669589219b9" Apr 12 20:50:30.469807 env[2117]: time="2024-04-12T20:50:30.469775266Z" level=error msg="StopPodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" failed" error="failed to destroy network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:30.469922 kubelet[3480]: E0412 20:50:30.469913 3480 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:50:30.469959 kubelet[3480]: E0412 20:50:30.469932 3480 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e"} Apr 12 20:50:30.469959 kubelet[3480]: E0412 20:50:30.469957 3480 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b4baf9f-2461-4b9d-bfd4-0537e0f65971\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:50:30.470068 kubelet[3480]: E0412 20:50:30.469983 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b4baf9f-2461-4b9d-bfd4-0537e0f65971\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-kl4n4" podUID="3b4baf9f-2461-4b9d-bfd4-0537e0f65971" Apr 12 20:50:30.569980 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c4e842cc1199008d21a8d6b5ddab981c00b831050db5ebb3dcf4b0c93442c34f-rootfs.mount: Deactivated successfully. Apr 12 20:50:31.290036 systemd[1]: Created slice kubepods-besteffort-pod386139dc_a3a7_41a6_b819_7fdf0822e6a9.slice. Apr 12 20:50:31.292377 env[2117]: time="2024-04-12T20:50:31.292340591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mzv5s,Uid:386139dc-a3a7-41a6-b819-7fdf0822e6a9,Namespace:calico-system,Attempt:0,}" Apr 12 20:50:31.335567 env[2117]: time="2024-04-12T20:50:31.335517666Z" level=error msg="Failed to destroy network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:31.335934 env[2117]: time="2024-04-12T20:50:31.335906818Z" level=error msg="encountered an error cleaning up failed sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:31.335975 env[2117]: time="2024-04-12T20:50:31.335955862Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mzv5s,Uid:386139dc-a3a7-41a6-b819-7fdf0822e6a9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:31.336135 kubelet[3480]: E0412 20:50:31.336120 3480 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:31.336308 kubelet[3480]: E0412 20:50:31.336166 3480 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:31.336308 kubelet[3480]: E0412 20:50:31.336185 3480 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mzv5s" Apr 12 20:50:31.336308 kubelet[3480]: E0412 20:50:31.336234 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mzv5s_calico-system(386139dc-a3a7-41a6-b819-7fdf0822e6a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mzv5s_calico-system(386139dc-a3a7-41a6-b819-7fdf0822e6a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mzv5s" podUID="386139dc-a3a7-41a6-b819-7fdf0822e6a9" Apr 12 20:50:31.337044 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601-shm.mount: Deactivated successfully. Apr 12 20:50:31.449278 kubelet[3480]: I0412 20:50:31.449254 3480 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:50:31.449687 env[2117]: time="2024-04-12T20:50:31.449660383Z" level=info msg="StopPodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\"" Apr 12 20:50:31.471493 env[2117]: time="2024-04-12T20:50:31.471450297Z" level=error msg="StopPodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" failed" error="failed to destroy network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 20:50:31.471636 kubelet[3480]: E0412 20:50:31.471620 3480 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:50:31.471684 kubelet[3480]: E0412 20:50:31.471657 3480 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601"} Apr 12 20:50:31.471741 kubelet[3480]: E0412 20:50:31.471690 3480 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 20:50:31.471741 kubelet[3480]: E0412 20:50:31.471716 3480 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"386139dc-a3a7-41a6-b819-7fdf0822e6a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mzv5s" podUID="386139dc-a3a7-41a6-b819-7fdf0822e6a9" Apr 12 20:50:34.233702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2149326857.mount: Deactivated successfully. Apr 12 20:50:34.257356 env[2117]: time="2024-04-12T20:50:34.257313285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:34.258015 env[2117]: time="2024-04-12T20:50:34.257992934Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:34.262955 env[2117]: time="2024-04-12T20:50:34.262932250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:34.263936 env[2117]: time="2024-04-12T20:50:34.263916761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:34.264423 env[2117]: time="2024-04-12T20:50:34.264403236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 20:50:34.271986 env[2117]: time="2024-04-12T20:50:34.271959622Z" level=info msg="CreateContainer within sandbox \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 20:50:34.278757 env[2117]: time="2024-04-12T20:50:34.278728710Z" level=info msg="CreateContainer within sandbox \"ab1255a31ee2d1dd082f6f50f62178ec4261e9e6780e343fc9c06c6e649849de\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"56836b7346c61265eb37d52f041c083c1eb9d0d146aa605df6c0389ca0db3bf3\"" Apr 12 20:50:34.279067 env[2117]: time="2024-04-12T20:50:34.279044733Z" level=info msg="StartContainer for \"56836b7346c61265eb37d52f041c083c1eb9d0d146aa605df6c0389ca0db3bf3\"" Apr 12 20:50:34.292748 systemd[1]: Started cri-containerd-56836b7346c61265eb37d52f041c083c1eb9d0d146aa605df6c0389ca0db3bf3.scope. Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.322222 kernel: kauditd_printk_skb: 261 callbacks suppressed Apr 12 20:50:34.322435 kernel: audit: type=1400 audit(1712955034.310:1136): avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4306 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:34.416759 kernel: audit: type=1300 audit(1712955034.310:1136): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4306 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:34.416828 kernel: audit: type=1327 audit(1712955034.310:1136): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383336623733343663363132363565623337643532663034316330 Apr 12 20:50:34.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383336623733343663363132363565623337643532663034316330 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.508123 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.508203 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.584879 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.584912 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.592297 env[2117]: time="2024-04-12T20:50:34.592266337Z" level=info msg="StartContainer for \"56836b7346c61265eb37d52f041c083c1eb9d0d146aa605df6c0389ca0db3bf3\" returns successfully" Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.662469 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.701069 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.701084 kernel: audit: type=1400 audit(1712955034.310:1137): avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.310000 audit: BPF prog-id=142 op=LOAD Apr 12 20:50:34.310000 audit[5059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4306 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:34.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383336623733343663363132363565623337643532663034316330 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.321000 audit: BPF prog-id=143 op=LOAD Apr 12 20:50:34.321000 audit[5059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4306 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:34.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383336623733343663363132363565623337643532663034316330 Apr 12 20:50:34.360000 audit: BPF prog-id=143 op=UNLOAD Apr 12 20:50:34.360000 audit: BPF prog-id=142 op=UNLOAD Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { perfmon } for pid=5059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit[5059]: AVC avc: denied { bpf } for pid=5059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:34.360000 audit: BPF prog-id=144 op=LOAD Apr 12 20:50:34.360000 audit[5059]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4306 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:34.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383336623733343663363132363565623337643532663034316330 Apr 12 20:50:34.797261 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 20:50:34.797309 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 20:50:35.142802 kubelet[3480]: I0412 20:50:35.142757 3480 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 20:50:35.160000 audit[5131]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=5131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:35.160000 audit[5131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffdecb8de0 a2=0 a3=1 items=0 ppid=3947 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:35.167000 audit[5131]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=5131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:35.167000 audit[5131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffdecb8de0 a2=0 a3=1 items=0 ppid=3947 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:35.475300 kubelet[3480]: I0412 20:50:35.475226 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-mp8j6" podStartSLOduration=1.626833531 podCreationTimestamp="2024-04-12 20:50:25 +0000 UTC" firstStartedPulling="2024-04-12 20:50:25.416236619 +0000 UTC m=+20.198111487" lastFinishedPulling="2024-04-12 20:50:34.26459569 +0000 UTC m=+29.046470598" observedRunningTime="2024-04-12 20:50:35.474688448 +0000 UTC m=+30.256563316" watchObservedRunningTime="2024-04-12 20:50:35.475192642 +0000 UTC m=+30.257067510" Apr 12 20:50:35.984000 audit[5178]: AVC avc: denied { write } for pid=5178 comm="tee" name="fd" dev="proc" ino=14852 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit[5178]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff76f7972 a2=241 a3=1b6 items=1 ppid=5143 pid=5178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit[5176]: AVC avc: denied { write } for pid=5176 comm="tee" name="fd" dev="proc" ino=100743 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=76957 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:35.984000 audit[5176]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd1ae8973 a2=241 a3=1b6 items=1 ppid=5144 pid=5176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=75918 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit[5183]: AVC avc: denied { write } for pid=5183 comm="tee" name="fd" dev="proc" ino=74853 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:35.984000 audit[5183]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf2b1962 a2=241 a3=1b6 items=1 ppid=5142 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=73818 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:35.984000 audit[5181]: AVC avc: denied { write } for pid=5181 comm="tee" name="fd" dev="proc" ino=41223 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit[5181]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc46fb971 a2=241 a3=1b6 items=1 ppid=5145 pid=5181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=74850 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:35.984000 audit[5185]: AVC avc: denied { write } for pid=5185 comm="tee" name="fd" dev="proc" ino=24449 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit[5185]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe55ee971 a2=241 a3=1b6 items=1 ppid=5148 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=80896 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:35.984000 audit[5189]: AVC avc: denied { write } for pid=5189 comm="tee" name="fd" dev="proc" ino=27894 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit[5189]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1a5a961 a2=241 a3=1b6 items=1 ppid=5149 pid=5189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=36210 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:35.984000 audit[5204]: AVC avc: denied { write } for pid=5204 comm="tee" name="fd" dev="proc" ino=55400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 20:50:35.984000 audit[5204]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0ca4971 a2=241 a3=1b6 items=1 ppid=5146 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:35.984000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 20:50:35.984000 audit: PATH item=0 name="/dev/fd/63" inode=89145 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:50:35.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.129000 audit: BPF prog-id=145 op=LOAD Apr 12 20:50:36.129000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc32174e8 a2=70 a3=ffffc3217558 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.129000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.130000 audit: BPF prog-id=145 op=UNLOAD Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit: BPF prog-id=146 op=LOAD Apr 12 20:50:36.130000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc32174e8 a2=70 a3=4b243c items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.130000 audit: BPF prog-id=146 op=UNLOAD Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc32174a0 a2=70 a3=ffffc3217510 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit: BPF prog-id=147 op=LOAD Apr 12 20:50:36.130000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc3217488 a2=70 a3=ffffc32174f8 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.130000 audit: BPF prog-id=147 op=UNLOAD Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3217558 a2=70 a3=0 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3217548 a2=70 a3=0 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.130000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.130000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc32174b8 a2=70 a3=0 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.130000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc3217590 a2=70 a3=3c4449ef items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3217590 a2=70 a3=3c4449ef items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { perfmon } for pid=5339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit[5339]: AVC avc: denied { bpf } for pid=5339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.131000 audit: BPF prog-id=148 op=LOAD Apr 12 20:50:36.131000 audit[5339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc32174b8 a2=70 a3=3c444a09 items=0 ppid=5156 pid=5339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 20:50:36.133000 audit[5343]: AVC avc: denied { bpf } for pid=5343 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.133000 audit[5343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3d9ef58 a2=70 a3=fffff3d9efc8 items=0 ppid=5156 pid=5343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 20:50:36.133000 audit[5343]: AVC avc: denied { bpf } for pid=5343 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:36.133000 audit[5343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3d9ee28 a2=70 a3=fffff3d9ee98 items=0 ppid=5156 pid=5343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.133000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 20:50:36.154000 audit: BPF prog-id=148 op=UNLOAD Apr 12 20:50:36.203000 audit[5528]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=5528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:36.203000 audit[5528]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd46bd610 a2=0 a3=ffffb48f0fa8 items=0 ppid=5156 pid=5528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.203000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:36.205000 audit[5527]: NETFILTER_CFG table=raw:96 family=2 entries=19 op=nft_register_chain pid=5527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:36.205000 audit[5527]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=fffff5b804f0 a2=0 a3=ffffa56cbfa8 items=0 ppid=5156 pid=5527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.205000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:36.206000 audit[5526]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=5526 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:36.206000 audit[5526]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc495ed20 a2=0 a3=ffff97148fa8 items=0 ppid=5156 pid=5526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.206000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:36.209000 audit[5531]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=5531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:36.209000 audit[5531]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff9d0dc90 a2=0 a3=ffff9aaf7fa8 items=0 ppid=5156 pid=5531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:36.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:36.459244 kubelet[3480]: I0412 20:50:36.459220 3480 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 20:50:37.056897 systemd-networkd[1943]: vxlan.calico: Link UP Apr 12 20:50:37.056901 systemd-networkd[1943]: vxlan.calico: Gained carrier Apr 12 20:50:38.531616 systemd-networkd[1943]: vxlan.calico: Gained IPv6LL Apr 12 20:50:42.286284 env[2117]: time="2024-04-12T20:50:42.286223171Z" level=info msg="StopPodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\"" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.327 [INFO][5570] k8s.go 585: Cleaning up netns ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.327 [INFO][5570] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" iface="eth0" netns="/var/run/netns/cni-56b52862-1e21-6a4e-147d-f16f4ee340e2" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.327 [INFO][5570] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" iface="eth0" netns="/var/run/netns/cni-56b52862-1e21-6a4e-147d-f16f4ee340e2" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.327 [INFO][5570] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" iface="eth0" netns="/var/run/netns/cni-56b52862-1e21-6a4e-147d-f16f4ee340e2" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.327 [INFO][5570] k8s.go 592: Releasing IP address(es) ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.327 [INFO][5570] utils.go 188: Calico CNI releasing IP address ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.358 [INFO][5592] ipam_plugin.go 415: Releasing address using handleID ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.358 [INFO][5592] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.358 [INFO][5592] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.367 [WARNING][5592] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.367 [INFO][5592] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.368 [INFO][5592] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:42.370682 env[2117]: 2024-04-12 20:50:42.369 [INFO][5570] k8s.go 598: Teardown processing complete. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:50:42.371120 env[2117]: time="2024-04-12T20:50:42.370833534Z" level=info msg="TearDown network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" successfully" Apr 12 20:50:42.371120 env[2117]: time="2024-04-12T20:50:42.370864776Z" level=info msg="StopPodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" returns successfully" Apr 12 20:50:42.371426 env[2117]: time="2024-04-12T20:50:42.371401244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-797954695c-s9lrd,Uid:db4c5592-c0b5-4583-a613-9e812d8442b3,Namespace:calico-system,Attempt:1,}" Apr 12 20:50:42.372471 systemd[1]: run-netns-cni\x2d56b52862\x2d1e21\x2d6a4e\x2d147d\x2df16f4ee340e2.mount: Deactivated successfully. Apr 12 20:50:42.462298 systemd-networkd[1943]: calia623be6d1be: Link UP Apr 12 20:50:42.487872 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:50:42.487916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia623be6d1be: link becomes ready Apr 12 20:50:42.487944 systemd-networkd[1943]: calia623be6d1be: Gained carrier Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.409 [INFO][5608] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0 calico-kube-controllers-797954695c- calico-system db4c5592-c0b5-4583-a613-9e812d8442b3 678 0 2024-04-12 20:50:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:797954695c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-aaaf4a72a0 calico-kube-controllers-797954695c-s9lrd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia623be6d1be [] []}} ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.409 [INFO][5608] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.432 [INFO][5632] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" HandleID="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.442 [INFO][5632] ipam_plugin.go 268: Auto assigning IP ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" HandleID="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003c1550), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-aaaf4a72a0", "pod":"calico-kube-controllers-797954695c-s9lrd", "timestamp":"2024-04-12 20:50:42.432573485 +0000 UTC"}, Hostname:"ci-3510.3.3-a-aaaf4a72a0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.442 [INFO][5632] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.442 [INFO][5632] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.442 [INFO][5632] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-aaaf4a72a0' Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.443 [INFO][5632] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.446 [INFO][5632] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.449 [INFO][5632] ipam.go 489: Trying affinity for 192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.450 [INFO][5632] ipam.go 155: Attempting to load block cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.452 [INFO][5632] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.452 [INFO][5632] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.28.0/26 handle="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.453 [INFO][5632] ipam.go 1682: Creating new handle: k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16 Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.455 [INFO][5632] ipam.go 1203: Writing block in order to claim IPs block=192.168.28.0/26 handle="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.459 [INFO][5632] ipam.go 1216: Successfully claimed IPs: [192.168.28.1/26] block=192.168.28.0/26 handle="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.459 [INFO][5632] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.28.1/26] handle="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.459 [INFO][5632] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:42.496371 env[2117]: 2024-04-12 20:50:42.459 [INFO][5632] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.28.1/26] IPv6=[] ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" HandleID="k8s-pod-network.5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.497318 env[2117]: 2024-04-12 20:50:42.461 [INFO][5608] k8s.go 385: Populated endpoint ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0", GenerateName:"calico-kube-controllers-797954695c-", Namespace:"calico-system", SelfLink:"", UID:"db4c5592-c0b5-4583-a613-9e812d8442b3", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"797954695c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"", Pod:"calico-kube-controllers-797954695c-s9lrd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.28.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia623be6d1be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:42.497318 env[2117]: 2024-04-12 20:50:42.461 [INFO][5608] k8s.go 386: Calico CNI using IPs: [192.168.28.1/32] ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.497318 env[2117]: 2024-04-12 20:50:42.461 [INFO][5608] dataplane_linux.go 68: Setting the host side veth name to calia623be6d1be ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.497318 env[2117]: 2024-04-12 20:50:42.488 [INFO][5608] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.497318 env[2117]: 2024-04-12 20:50:42.488 [INFO][5608] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0", GenerateName:"calico-kube-controllers-797954695c-", Namespace:"calico-system", SelfLink:"", UID:"db4c5592-c0b5-4583-a613-9e812d8442b3", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"797954695c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16", Pod:"calico-kube-controllers-797954695c-s9lrd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.28.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia623be6d1be", MAC:"fa:4b:bb:f0:9e:12", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:42.497318 env[2117]: 2024-04-12 20:50:42.495 [INFO][5608] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16" Namespace="calico-system" Pod="calico-kube-controllers-797954695c-s9lrd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:50:42.505374 env[2117]: time="2024-04-12T20:50:42.505329060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:42.505410 env[2117]: time="2024-04-12T20:50:42.505367422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:42.505410 env[2117]: time="2024-04-12T20:50:42.505377783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:42.505512 env[2117]: time="2024-04-12T20:50:42.505494549Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16 pid=5676 runtime=io.containerd.runc.v2 Apr 12 20:50:42.505000 audit[5685]: NETFILTER_CFG table=filter:99 family=2 entries=36 op=nft_register_chain pid=5685 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:42.517022 systemd[1]: Started cri-containerd-5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16.scope. Apr 12 20:50:42.518769 kernel: kauditd_printk_skb: 163 callbacks suppressed Apr 12 20:50:42.518836 kernel: audit: type=1325 audit(1712955042.505:1171): table=filter:99 family=2 entries=36 op=nft_register_chain pid=5685 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:42.505000 audit[5685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffce5a0370 a2=0 a3=ffff8d505fa8 items=0 ppid=5156 pid=5685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.602889 kernel: audit: type=1300 audit(1712955042.505:1171): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffce5a0370 a2=0 a3=ffff8d505fa8 items=0 ppid=5156 pid=5685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.602958 kernel: audit: type=1327 audit(1712955042.505:1171): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:42.505000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.676423 kernel: audit: type=1400 audit(1712955042.573:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.676463 kernel: audit: type=1400 audit(1712955042.573:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.751537 kernel: audit: type=1400 audit(1712955042.573:1174): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.751587 kernel: audit: type=1400 audit(1712955042.573:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.865257 kernel: audit: type=1400 audit(1712955042.573:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.865289 kernel: audit: type=1400 audit(1712955042.573:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.865379 kernel: audit: type=1400 audit(1712955042.573:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.874258 env[2117]: time="2024-04-12T20:50:42.874229326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-797954695c-s9lrd,Uid:db4c5592-c0b5-4583-a613-9e812d8442b3,Namespace:calico-system,Attempt:1,} returns sandbox id \"5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16\"" Apr 12 20:50:42.875349 env[2117]: time="2024-04-12T20:50:42.875330664Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit: BPF prog-id=149 op=LOAD Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5676 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563306664333635616466336238393235373530353262366230333665 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5676 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563306664333635616466336238393235373530353262366230333665 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.601000 audit: BPF prog-id=150 op=LOAD Apr 12 20:50:42.601000 audit[5688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5676 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563306664333635616466336238393235373530353262366230333665 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.637000 audit: BPF prog-id=151 op=LOAD Apr 12 20:50:42.637000 audit[5688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5676 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563306664333635616466336238393235373530353262366230333665 Apr 12 20:50:42.675000 audit: BPF prog-id=151 op=UNLOAD Apr 12 20:50:42.675000 audit: BPF prog-id=150 op=UNLOAD Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { perfmon } for pid=5688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit[5688]: AVC avc: denied { bpf } for pid=5688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:42.675000 audit: BPF prog-id=152 op=LOAD Apr 12 20:50:42.675000 audit[5688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5676 pid=5688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:42.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563306664333635616466336238393235373530353262366230333665 Apr 12 20:50:43.287600 env[2117]: time="2024-04-12T20:50:43.287522516Z" level=info msg="StopPodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\"" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.324 [INFO][5727] k8s.go 585: Cleaning up netns ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.324 [INFO][5727] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" iface="eth0" netns="/var/run/netns/cni-bc59af55-0386-eab7-07b4-11324f45a3e4" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.324 [INFO][5727] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" iface="eth0" netns="/var/run/netns/cni-bc59af55-0386-eab7-07b4-11324f45a3e4" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.324 [INFO][5727] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" iface="eth0" netns="/var/run/netns/cni-bc59af55-0386-eab7-07b4-11324f45a3e4" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.324 [INFO][5727] k8s.go 592: Releasing IP address(es) ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.324 [INFO][5727] utils.go 188: Calico CNI releasing IP address ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.342 [INFO][5744] ipam_plugin.go 415: Releasing address using handleID ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.342 [INFO][5744] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.342 [INFO][5744] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.350 [WARNING][5744] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.350 [INFO][5744] ipam_plugin.go 443: Releasing address using workloadID ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.351 [INFO][5744] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:43.353371 env[2117]: 2024-04-12 20:50:43.352 [INFO][5727] k8s.go 598: Teardown processing complete. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:50:43.353811 env[2117]: time="2024-04-12T20:50:43.353589779Z" level=info msg="TearDown network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" successfully" Apr 12 20:50:43.353811 env[2117]: time="2024-04-12T20:50:43.353639461Z" level=info msg="StopPodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" returns successfully" Apr 12 20:50:43.354173 env[2117]: time="2024-04-12T20:50:43.354147207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5g7kd,Uid:dc02e469-9777-4ca3-9d95-d669589219b9,Namespace:kube-system,Attempt:1,}" Apr 12 20:50:43.373371 systemd[1]: run-netns-cni\x2dbc59af55\x2d0386\x2deab7\x2d07b4\x2d11324f45a3e4.mount: Deactivated successfully. Apr 12 20:50:43.440740 systemd-networkd[1943]: cali35437bbec7c: Link UP Apr 12 20:50:43.454440 systemd-networkd[1943]: cali35437bbec7c: Gained carrier Apr 12 20:50:43.454556 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali35437bbec7c: link becomes ready Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.386 [INFO][5759] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0 coredns-5dd5756b68- kube-system dc02e469-9777-4ca3-9d95-d669589219b9 687 0 2024-04-12 20:50:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-aaaf4a72a0 coredns-5dd5756b68-5g7kd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali35437bbec7c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.386 [INFO][5759] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.410 [INFO][5783] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" HandleID="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.420 [INFO][5783] ipam_plugin.go 268: Auto assigning IP ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" HandleID="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000349a70), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-aaaf4a72a0", "pod":"coredns-5dd5756b68-5g7kd", "timestamp":"2024-04-12 20:50:43.410256841 +0000 UTC"}, Hostname:"ci-3510.3.3-a-aaaf4a72a0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.420 [INFO][5783] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.420 [INFO][5783] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.420 [INFO][5783] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-aaaf4a72a0' Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.421 [INFO][5783] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.424 [INFO][5783] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.427 [INFO][5783] ipam.go 489: Trying affinity for 192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.428 [INFO][5783] ipam.go 155: Attempting to load block cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.430 [INFO][5783] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.430 [INFO][5783] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.28.0/26 handle="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.431 [INFO][5783] ipam.go 1682: Creating new handle: k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1 Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.433 [INFO][5783] ipam.go 1203: Writing block in order to claim IPs block=192.168.28.0/26 handle="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.436 [INFO][5783] ipam.go 1216: Successfully claimed IPs: [192.168.28.2/26] block=192.168.28.0/26 handle="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.436 [INFO][5783] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.28.2/26] handle="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.436 [INFO][5783] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:43.462130 env[2117]: 2024-04-12 20:50:43.436 [INFO][5783] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.28.2/26] IPv6=[] ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" HandleID="k8s-pod-network.e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.462679 env[2117]: 2024-04-12 20:50:43.438 [INFO][5759] k8s.go 385: Populated endpoint ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"dc02e469-9777-4ca3-9d95-d669589219b9", ResourceVersion:"687", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"", Pod:"coredns-5dd5756b68-5g7kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35437bbec7c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:43.462679 env[2117]: 2024-04-12 20:50:43.438 [INFO][5759] k8s.go 386: Calico CNI using IPs: [192.168.28.2/32] ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.462679 env[2117]: 2024-04-12 20:50:43.438 [INFO][5759] dataplane_linux.go 68: Setting the host side veth name to cali35437bbec7c ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.462679 env[2117]: 2024-04-12 20:50:43.454 [INFO][5759] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.462679 env[2117]: 2024-04-12 20:50:43.454 [INFO][5759] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"dc02e469-9777-4ca3-9d95-d669589219b9", ResourceVersion:"687", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1", Pod:"coredns-5dd5756b68-5g7kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35437bbec7c", MAC:"02:c1:9e:2d:c0:a2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:43.462679 env[2117]: 2024-04-12 20:50:43.460 [INFO][5759] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1" Namespace="kube-system" Pod="coredns-5dd5756b68-5g7kd" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:50:43.471613 env[2117]: time="2024-04-12T20:50:43.471566380Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:43.471613 env[2117]: time="2024-04-12T20:50:43.471606582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:43.471735 env[2117]: time="2024-04-12T20:50:43.471617143Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:43.471735 env[2117]: time="2024-04-12T20:50:43.471719828Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1 pid=5821 runtime=io.containerd.runc.v2 Apr 12 20:50:43.470000 audit[5824]: NETFILTER_CFG table=filter:100 family=2 entries=40 op=nft_register_chain pid=5824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:43.470000 audit[5824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21592 a0=3 a1=ffffdbe3a480 a2=0 a3=ffffa1c5cfa8 items=0 ppid=5156 pid=5824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:43.483901 systemd[1]: Started cri-containerd-e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1.scope. Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.493000 audit: BPF prog-id=153 op=LOAD Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5821 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643836303130326263323132333936313262663063626263366637 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5821 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643836303130326263323132333936313262663063626263366637 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit: BPF prog-id=154 op=LOAD Apr 12 20:50:43.494000 audit[5832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5821 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643836303130326263323132333936313262663063626263366637 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit: BPF prog-id=155 op=LOAD Apr 12 20:50:43.494000 audit[5832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5821 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643836303130326263323132333936313262663063626263366637 Apr 12 20:50:43.494000 audit: BPF prog-id=155 op=UNLOAD Apr 12 20:50:43.494000 audit: BPF prog-id=154 op=UNLOAD Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { perfmon } for pid=5832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit[5832]: AVC avc: denied { bpf } for pid=5832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.494000 audit: BPF prog-id=156 op=LOAD Apr 12 20:50:43.494000 audit[5832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5821 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537643836303130326263323132333936313262663063626263366637 Apr 12 20:50:43.509697 env[2117]: time="2024-04-12T20:50:43.509650491Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5g7kd,Uid:dc02e469-9777-4ca3-9d95-d669589219b9,Namespace:kube-system,Attempt:1,} returns sandbox id \"e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1\"" Apr 12 20:50:43.511561 env[2117]: time="2024-04-12T20:50:43.511537027Z" level=info msg="CreateContainer within sandbox \"e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 20:50:43.516825 env[2117]: time="2024-04-12T20:50:43.516791856Z" level=info msg="CreateContainer within sandbox \"e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e198a0e4e8cf10d5849895e756e00c4c4d72b2577af1ed435ed53784ded81914\"" Apr 12 20:50:43.517134 env[2117]: time="2024-04-12T20:50:43.517104912Z" level=info msg="StartContainer for \"e198a0e4e8cf10d5849895e756e00c4c4d72b2577af1ed435ed53784ded81914\"" Apr 12 20:50:43.528926 systemd[1]: Started cri-containerd-e198a0e4e8cf10d5849895e756e00c4c4d72b2577af1ed435ed53784ded81914.scope. Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit: BPF prog-id=157 op=LOAD Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5821 pid=5861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393861306534653863663130643538343938393565373536653030 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5821 pid=5861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393861306534653863663130643538343938393565373536653030 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit: BPF prog-id=158 op=LOAD Apr 12 20:50:43.542000 audit[5861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5821 pid=5861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393861306534653863663130643538343938393565373536653030 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit: BPF prog-id=159 op=LOAD Apr 12 20:50:43.542000 audit[5861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5821 pid=5861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393861306534653863663130643538343938393565373536653030 Apr 12 20:50:43.542000 audit: BPF prog-id=159 op=UNLOAD Apr 12 20:50:43.542000 audit: BPF prog-id=158 op=UNLOAD Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { perfmon } for pid=5861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit[5861]: AVC avc: denied { bpf } for pid=5861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.542000 audit: BPF prog-id=160 op=LOAD Apr 12 20:50:43.542000 audit[5861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5821 pid=5861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531393861306534653863663130643538343938393565373536653030 Apr 12 20:50:43.556999 env[2117]: time="2024-04-12T20:50:43.556969034Z" level=info msg="StartContainer for \"e198a0e4e8cf10d5849895e756e00c4c4d72b2577af1ed435ed53784ded81914\" returns successfully" Apr 12 20:50:43.715530 systemd-networkd[1943]: calia623be6d1be: Gained IPv6LL Apr 12 20:50:43.802063 env[2117]: time="2024-04-12T20:50:43.802002782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:43.802714 env[2117]: time="2024-04-12T20:50:43.802693177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:43.803788 env[2117]: time="2024-04-12T20:50:43.803769792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:43.804829 env[2117]: time="2024-04-12T20:50:43.804801085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:43.805302 env[2117]: time="2024-04-12T20:50:43.805276829Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 20:50:43.811327 env[2117]: time="2024-04-12T20:50:43.811301538Z" level=info msg="CreateContainer within sandbox \"5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 20:50:43.816165 env[2117]: time="2024-04-12T20:50:43.816135585Z" level=info msg="CreateContainer within sandbox \"5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0075bae81eaee14b25ded5776d8bc38200dea2d2a9c24ea0f1cccd466c8f8ae2\"" Apr 12 20:50:43.816486 env[2117]: time="2024-04-12T20:50:43.816463562Z" level=info msg="StartContainer for \"0075bae81eaee14b25ded5776d8bc38200dea2d2a9c24ea0f1cccd466c8f8ae2\"" Apr 12 20:50:43.828909 systemd[1]: Started cri-containerd-0075bae81eaee14b25ded5776d8bc38200dea2d2a9c24ea0f1cccd466c8f8ae2.scope. Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.842000 audit: BPF prog-id=161 op=LOAD Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5676 pid=5919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030373562616538316561656531346232356465643537373664386263 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5676 pid=5919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030373562616538316561656531346232356465643537373664386263 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit: BPF prog-id=162 op=LOAD Apr 12 20:50:43.843000 audit[5919]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5676 pid=5919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030373562616538316561656531346232356465643537373664386263 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit: BPF prog-id=163 op=LOAD Apr 12 20:50:43.843000 audit[5919]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5676 pid=5919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030373562616538316561656531346232356465643537373664386263 Apr 12 20:50:43.843000 audit: BPF prog-id=163 op=UNLOAD Apr 12 20:50:43.843000 audit: BPF prog-id=162 op=UNLOAD Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { perfmon } for pid=5919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit[5919]: AVC avc: denied { bpf } for pid=5919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:43.843000 audit: BPF prog-id=164 op=LOAD Apr 12 20:50:43.843000 audit[5919]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5676 pid=5919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:43.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030373562616538316561656531346232356465643537373664386263 Apr 12 20:50:43.859775 env[2117]: time="2024-04-12T20:50:43.859746139Z" level=info msg="StartContainer for \"0075bae81eaee14b25ded5776d8bc38200dea2d2a9c24ea0f1cccd466c8f8ae2\" returns successfully" Apr 12 20:50:44.286555 env[2117]: time="2024-04-12T20:50:44.286518919Z" level=info msg="StopPodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\"" Apr 12 20:50:44.286688 env[2117]: time="2024-04-12T20:50:44.286651526Z" level=info msg="StopPodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\"" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.326 [INFO][5993] k8s.go 585: Cleaning up netns ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.326 [INFO][5993] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" iface="eth0" netns="/var/run/netns/cni-0827ba67-2e32-c203-f55a-cc51865d4812" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.326 [INFO][5993] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" iface="eth0" netns="/var/run/netns/cni-0827ba67-2e32-c203-f55a-cc51865d4812" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.326 [INFO][5993] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" iface="eth0" netns="/var/run/netns/cni-0827ba67-2e32-c203-f55a-cc51865d4812" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.326 [INFO][5993] k8s.go 592: Releasing IP address(es) ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.326 [INFO][5993] utils.go 188: Calico CNI releasing IP address ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.344 [INFO][6021] ipam_plugin.go 415: Releasing address using handleID ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.344 [INFO][6021] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.344 [INFO][6021] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.353 [WARNING][6021] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.353 [INFO][6021] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.354 [INFO][6021] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:44.356641 env[2117]: 2024-04-12 20:50:44.355 [INFO][5993] k8s.go 598: Teardown processing complete. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:50:44.357201 env[2117]: time="2024-04-12T20:50:44.356785240Z" level=info msg="TearDown network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" successfully" Apr 12 20:50:44.357201 env[2117]: time="2024-04-12T20:50:44.356814522Z" level=info msg="StopPodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" returns successfully" Apr 12 20:50:44.357406 env[2117]: time="2024-04-12T20:50:44.357378870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mzv5s,Uid:386139dc-a3a7-41a6-b819-7fdf0822e6a9,Namespace:calico-system,Attempt:1,}" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.327 [INFO][5994] k8s.go 585: Cleaning up netns ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.327 [INFO][5994] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" iface="eth0" netns="/var/run/netns/cni-07cf4461-a3ff-a8f1-a2e7-3cecf16b8720" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.327 [INFO][5994] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" iface="eth0" netns="/var/run/netns/cni-07cf4461-a3ff-a8f1-a2e7-3cecf16b8720" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.327 [INFO][5994] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" iface="eth0" netns="/var/run/netns/cni-07cf4461-a3ff-a8f1-a2e7-3cecf16b8720" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.327 [INFO][5994] k8s.go 592: Releasing IP address(es) ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.327 [INFO][5994] utils.go 188: Calico CNI releasing IP address ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.344 [INFO][6022] ipam_plugin.go 415: Releasing address using handleID ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.344 [INFO][6022] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.354 [INFO][6022] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.364 [WARNING][6022] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.364 [INFO][6022] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.365 [INFO][6022] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:44.368331 env[2117]: 2024-04-12 20:50:44.367 [INFO][5994] k8s.go 598: Teardown processing complete. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:50:44.368643 env[2117]: time="2024-04-12T20:50:44.368498661Z" level=info msg="TearDown network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" successfully" Apr 12 20:50:44.368643 env[2117]: time="2024-04-12T20:50:44.368528582Z" level=info msg="StopPodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" returns successfully" Apr 12 20:50:44.368968 env[2117]: time="2024-04-12T20:50:44.368945363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-kl4n4,Uid:3b4baf9f-2461-4b9d-bfd4-0537e0f65971,Namespace:kube-system,Attempt:1,}" Apr 12 20:50:44.375961 systemd[1]: run-netns-cni\x2d0827ba67\x2d2e32\x2dc203\x2df55a\x2dcc51865d4812.mount: Deactivated successfully. Apr 12 20:50:44.376044 systemd[1]: run-netns-cni\x2d07cf4461\x2da3ff\x2da8f1\x2da2e7\x2d3cecf16b8720.mount: Deactivated successfully. Apr 12 20:50:44.447395 systemd-networkd[1943]: cali5665a123e4b: Link UP Apr 12 20:50:44.472589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:50:44.472682 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5665a123e4b: link becomes ready Apr 12 20:50:44.472840 systemd-networkd[1943]: cali5665a123e4b: Gained carrier Apr 12 20:50:44.473672 systemd-networkd[1943]: cali8ab52b85a71: Link UP Apr 12 20:50:44.479651 kubelet[3480]: I0412 20:50:44.479629 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-797954695c-s9lrd" podStartSLOduration=18.549209058 podCreationTimestamp="2024-04-12 20:50:25 +0000 UTC" firstStartedPulling="2024-04-12 20:50:42.875078451 +0000 UTC m=+37.656953319" lastFinishedPulling="2024-04-12 20:50:43.805457158 +0000 UTC m=+38.587332066" observedRunningTime="2024-04-12 20:50:44.47948384 +0000 UTC m=+39.261358708" watchObservedRunningTime="2024-04-12 20:50:44.479587805 +0000 UTC m=+39.261462673" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.393 [INFO][6058] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0 csi-node-driver- calico-system 386139dc-a3a7-41a6-b819-7fdf0822e6a9 706 0 2024-04-12 20:50:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-aaaf4a72a0 csi-node-driver-mzv5s eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali5665a123e4b [] []}} ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.393 [INFO][6058] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.417 [INFO][6109] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" HandleID="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.427 [INFO][6109] ipam_plugin.go 268: Auto assigning IP ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" HandleID="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003c4af0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-aaaf4a72a0", "pod":"csi-node-driver-mzv5s", "timestamp":"2024-04-12 20:50:44.417302719 +0000 UTC"}, Hostname:"ci-3510.3.3-a-aaaf4a72a0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.427 [INFO][6109] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.427 [INFO][6109] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.427 [INFO][6109] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-aaaf4a72a0' Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.428 [INFO][6109] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.431 [INFO][6109] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.434 [INFO][6109] ipam.go 489: Trying affinity for 192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.435 [INFO][6109] ipam.go 155: Attempting to load block cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.437 [INFO][6109] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.437 [INFO][6109] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.28.0/26 handle="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.438 [INFO][6109] ipam.go 1682: Creating new handle: k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.440 [INFO][6109] ipam.go 1203: Writing block in order to claim IPs block=192.168.28.0/26 handle="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.443 [INFO][6109] ipam.go 1216: Successfully claimed IPs: [192.168.28.3/26] block=192.168.28.0/26 handle="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.443 [INFO][6109] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.28.3/26] handle="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.443 [INFO][6109] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:44.480140 env[2117]: 2024-04-12 20:50:44.444 [INFO][6109] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.28.3/26] IPv6=[] ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" HandleID="k8s-pod-network.713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.480587 env[2117]: 2024-04-12 20:50:44.446 [INFO][6058] k8s.go 385: Populated endpoint ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"386139dc-a3a7-41a6-b819-7fdf0822e6a9", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"", Pod:"csi-node-driver-mzv5s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.28.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5665a123e4b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:44.480587 env[2117]: 2024-04-12 20:50:44.446 [INFO][6058] k8s.go 386: Calico CNI using IPs: [192.168.28.3/32] ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.480587 env[2117]: 2024-04-12 20:50:44.446 [INFO][6058] dataplane_linux.go 68: Setting the host side veth name to cali5665a123e4b ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.480587 env[2117]: 2024-04-12 20:50:44.472 [INFO][6058] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.480587 env[2117]: 2024-04-12 20:50:44.473 [INFO][6058] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"386139dc-a3a7-41a6-b819-7fdf0822e6a9", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb", Pod:"csi-node-driver-mzv5s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.28.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5665a123e4b", MAC:"46:7a:50:d1:e7:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:44.480587 env[2117]: 2024-04-12 20:50:44.478 [INFO][6058] k8s.go 498: Wrote updated endpoint to datastore ContainerID="713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb" Namespace="calico-system" Pod="csi-node-driver-mzv5s" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:50:44.487138 kubelet[3480]: I0412 20:50:44.487093 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-5g7kd" podStartSLOduration=24.487058455 podCreationTimestamp="2024-04-12 20:50:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:50:44.486776401 +0000 UTC m=+39.268651269" watchObservedRunningTime="2024-04-12 20:50:44.487058455 +0000 UTC m=+39.268933323" Apr 12 20:50:44.487470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ab52b85a71: link becomes ready Apr 12 20:50:44.487612 systemd-networkd[1943]: cali8ab52b85a71: Gained carrier Apr 12 20:50:44.489822 env[2117]: time="2024-04-12T20:50:44.489756109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:44.489822 env[2117]: time="2024-04-12T20:50:44.489811311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:44.489822 env[2117]: time="2024-04-12T20:50:44.489822152Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:44.489990 env[2117]: time="2024-04-12T20:50:44.489969879Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb pid=6186 runtime=io.containerd.runc.v2 Apr 12 20:50:44.489000 audit[6196]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=6196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:44.489000 audit[6196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19828 a0=3 a1=ffffdc086f00 a2=0 a3=ffffa0a23fa8 items=0 ppid=5156 pid=6196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.489000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.400 [INFO][6074] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0 coredns-5dd5756b68- kube-system 3b4baf9f-2461-4b9d-bfd4-0537e0f65971 707 0 2024-04-12 20:50:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-aaaf4a72a0 coredns-5dd5756b68-kl4n4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8ab52b85a71 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.400 [INFO][6074] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.427 [INFO][6125] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" HandleID="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.439 [INFO][6125] ipam_plugin.go 268: Auto assigning IP ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" HandleID="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003240e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-aaaf4a72a0", "pod":"coredns-5dd5756b68-kl4n4", "timestamp":"2024-04-12 20:50:44.427576988 +0000 UTC"}, Hostname:"ci-3510.3.3-a-aaaf4a72a0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.439 [INFO][6125] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.443 [INFO][6125] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.444 [INFO][6125] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-aaaf4a72a0' Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.445 [INFO][6125] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.448 [INFO][6125] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.450 [INFO][6125] ipam.go 489: Trying affinity for 192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.452 [INFO][6125] ipam.go 155: Attempting to load block cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.453 [INFO][6125] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.453 [INFO][6125] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.28.0/26 handle="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.454 [INFO][6125] ipam.go 1682: Creating new handle: k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0 Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.457 [INFO][6125] ipam.go 1203: Writing block in order to claim IPs block=192.168.28.0/26 handle="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.460 [INFO][6125] ipam.go 1216: Successfully claimed IPs: [192.168.28.4/26] block=192.168.28.0/26 handle="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.460 [INFO][6125] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.28.4/26] handle="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.460 [INFO][6125] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:44.496787 env[2117]: 2024-04-12 20:50:44.460 [INFO][6125] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.28.4/26] IPv6=[] ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" HandleID="k8s-pod-network.5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.497274 env[2117]: 2024-04-12 20:50:44.462 [INFO][6074] k8s.go 385: Populated endpoint ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3b4baf9f-2461-4b9d-bfd4-0537e0f65971", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"", Pod:"coredns-5dd5756b68-kl4n4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ab52b85a71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:44.497274 env[2117]: 2024-04-12 20:50:44.463 [INFO][6074] k8s.go 386: Calico CNI using IPs: [192.168.28.4/32] ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.497274 env[2117]: 2024-04-12 20:50:44.463 [INFO][6074] dataplane_linux.go 68: Setting the host side veth name to cali8ab52b85a71 ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.497274 env[2117]: 2024-04-12 20:50:44.487 [INFO][6074] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.497274 env[2117]: 2024-04-12 20:50:44.487 [INFO][6074] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3b4baf9f-2461-4b9d-bfd4-0537e0f65971", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0", Pod:"coredns-5dd5756b68-kl4n4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ab52b85a71", MAC:"aa:99:99:24:c7:a4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:44.497274 env[2117]: 2024-04-12 20:50:44.495 [INFO][6074] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0" Namespace="kube-system" Pod="coredns-5dd5756b68-kl4n4" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:50:44.499699 systemd[1]: Started cri-containerd-713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb.scope. Apr 12 20:50:44.505832 env[2117]: time="2024-04-12T20:50:44.505787343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:44.505832 env[2117]: time="2024-04-12T20:50:44.505823105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:44.505909 env[2117]: time="2024-04-12T20:50:44.505833705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:44.505965 env[2117]: time="2024-04-12T20:50:44.505946111Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0 pid=6241 runtime=io.containerd.runc.v2 Apr 12 20:50:44.493000 audit[6209]: NETFILTER_CFG table=filter:102 family=2 entries=11 op=nft_register_rule pid=6209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:44.493000 audit[6209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffcc1bcd0 a2=0 a3=1 items=0 ppid=3947 pid=6209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.511000 audit: BPF prog-id=165 op=LOAD Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=6186 pid=6202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336630616336313865356364306332316465363465393236613230 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=6186 pid=6202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336630616336313865356364306332316465363465393236613230 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit: BPF prog-id=166 op=LOAD Apr 12 20:50:44.512000 audit[6202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=6186 pid=6202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336630616336313865356364306332316465363465393236613230 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit: BPF prog-id=167 op=LOAD Apr 12 20:50:44.512000 audit[6202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=6186 pid=6202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336630616336313865356364306332316465363465393236613230 Apr 12 20:50:44.512000 audit: BPF prog-id=167 op=UNLOAD Apr 12 20:50:44.512000 audit: BPF prog-id=166 op=UNLOAD Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { perfmon } for pid=6202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit[6202]: AVC avc: denied { bpf } for pid=6202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.512000 audit: BPF prog-id=168 op=LOAD Apr 12 20:50:44.512000 audit[6202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=6186 pid=6202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336630616336313865356364306332316465363465393236613230 Apr 12 20:50:44.515468 systemd[1]: Started cri-containerd-5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0.scope. Apr 12 20:50:44.521883 env[2117]: time="2024-04-12T20:50:44.521847819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mzv5s,Uid:386139dc-a3a7-41a6-b819-7fdf0822e6a9,Namespace:calico-system,Attempt:1,} returns sandbox id \"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb\"" Apr 12 20:50:44.523065 env[2117]: time="2024-04-12T20:50:44.523043318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 20:50:44.508000 audit[6209]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=6209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:44.508000 audit[6209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffffcc1bcd0 a2=0 a3=1 items=0 ppid=3947 pid=6209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit: BPF prog-id=169 op=LOAD Apr 12 20:50:44.528000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.528000 audit[6256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=6241 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313862643061303834393738363131313234663634656663363164 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=6241 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313862643061303834393738363131313234663634656663363164 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit: BPF prog-id=170 op=LOAD Apr 12 20:50:44.529000 audit[6256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=6241 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313862643061303834393738363131313234663634656663363164 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit: BPF prog-id=171 op=LOAD Apr 12 20:50:44.529000 audit[6256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=6241 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313862643061303834393738363131313234663634656663363164 Apr 12 20:50:44.529000 audit: BPF prog-id=171 op=UNLOAD Apr 12 20:50:44.529000 audit: BPF prog-id=170 op=UNLOAD Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { perfmon } for pid=6256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit[6256]: AVC avc: denied { bpf } for pid=6256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.529000 audit: BPF prog-id=172 op=LOAD Apr 12 20:50:44.529000 audit[6256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=6241 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313862643061303834393738363131313234663634656663363164 Apr 12 20:50:44.526000 audit[6285]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=6285 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:44.526000 audit[6285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=ffffd3ba6100 a2=0 a3=ffff929f6fa8 items=0 ppid=5156 pid=6285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:44.546526 env[2117]: time="2024-04-12T20:50:44.546489799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-kl4n4,Uid:3b4baf9f-2461-4b9d-bfd4-0537e0f65971,Namespace:kube-system,Attempt:1,} returns sandbox id \"5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0\"" Apr 12 20:50:44.548479 env[2117]: time="2024-04-12T20:50:44.548452177Z" level=info msg="CreateContainer within sandbox \"5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 20:50:44.556917 env[2117]: time="2024-04-12T20:50:44.556887195Z" level=info msg="CreateContainer within sandbox \"5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d485b440c71b3f403953aff7b61bc4d86ffb642a1d15c415b686af4314f42b4b\"" Apr 12 20:50:44.557221 env[2117]: time="2024-04-12T20:50:44.557200690Z" level=info msg="StartContainer for \"d485b440c71b3f403953aff7b61bc4d86ffb642a1d15c415b686af4314f42b4b\"" Apr 12 20:50:44.569000 systemd[1]: Started cri-containerd-d485b440c71b3f403953aff7b61bc4d86ffb642a1d15c415b686af4314f42b4b.scope. Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit: BPF prog-id=173 op=LOAD Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6241 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383562343430633731623366343033393533616666376236316263 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6241 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383562343430633731623366343033393533616666376236316263 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit: BPF prog-id=174 op=LOAD Apr 12 20:50:44.582000 audit[6299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6241 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383562343430633731623366343033393533616666376236316263 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.582000 audit: BPF prog-id=175 op=LOAD Apr 12 20:50:44.582000 audit[6299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6241 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383562343430633731623366343033393533616666376236316263 Apr 12 20:50:44.583000 audit: BPF prog-id=175 op=UNLOAD Apr 12 20:50:44.583000 audit: BPF prog-id=174 op=UNLOAD Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { perfmon } for pid=6299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit[6299]: AVC avc: denied { bpf } for pid=6299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:44.583000 audit: BPF prog-id=176 op=LOAD Apr 12 20:50:44.583000 audit[6299]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6241 pid=6299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:44.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434383562343430633731623366343033393533616666376236316263 Apr 12 20:50:44.592540 env[2117]: time="2024-04-12T20:50:44.592508679Z" level=info msg="StartContainer for \"d485b440c71b3f403953aff7b61bc4d86ffb642a1d15c415b686af4314f42b4b\" returns successfully" Apr 12 20:50:44.803564 systemd-networkd[1943]: cali35437bbec7c: Gained IPv6LL Apr 12 20:50:45.026525 env[2117]: time="2024-04-12T20:50:45.026489542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.027129 env[2117]: time="2024-04-12T20:50:45.027103052Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.027999 env[2117]: time="2024-04-12T20:50:45.027984254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.028824 env[2117]: time="2024-04-12T20:50:45.028809694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.029292 env[2117]: time="2024-04-12T20:50:45.029266796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 20:50:45.030763 env[2117]: time="2024-04-12T20:50:45.030738746Z" level=info msg="CreateContainer within sandbox \"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 20:50:45.038415 env[2117]: time="2024-04-12T20:50:45.038367632Z" level=info msg="CreateContainer within sandbox \"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"27bfcd08befd0508e15656ab6d9d0f49d98fccff2813d3a29e6d23d9bb36bc94\"" Apr 12 20:50:45.039330 env[2117]: time="2024-04-12T20:50:45.039273916Z" level=info msg="StartContainer for \"27bfcd08befd0508e15656ab6d9d0f49d98fccff2813d3a29e6d23d9bb36bc94\"" Apr 12 20:50:45.053865 systemd[1]: Started cri-containerd-27bfcd08befd0508e15656ab6d9d0f49d98fccff2813d3a29e6d23d9bb36bc94.scope. Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=6186 pid=6353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626663643038626566643035303865313536353661623664396430 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.068000 audit: BPF prog-id=177 op=LOAD Apr 12 20:50:45.068000 audit[6353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=6186 pid=6353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626663643038626566643035303865313536353661623664396430 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit: BPF prog-id=178 op=LOAD Apr 12 20:50:45.069000 audit[6353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=6186 pid=6353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626663643038626566643035303865313536353661623664396430 Apr 12 20:50:45.069000 audit: BPF prog-id=178 op=UNLOAD Apr 12 20:50:45.069000 audit: BPF prog-id=177 op=UNLOAD Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { perfmon } for pid=6353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit[6353]: AVC avc: denied { bpf } for pid=6353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.069000 audit: BPF prog-id=179 op=LOAD Apr 12 20:50:45.069000 audit[6353]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=6186 pid=6353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237626663643038626566643035303865313536353661623664396430 Apr 12 20:50:45.079426 env[2117]: time="2024-04-12T20:50:45.079394841Z" level=info msg="StartContainer for \"27bfcd08befd0508e15656ab6d9d0f49d98fccff2813d3a29e6d23d9bb36bc94\" returns successfully" Apr 12 20:50:45.080181 env[2117]: time="2024-04-12T20:50:45.080162878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 20:50:45.485395 kubelet[3480]: I0412 20:50:45.485362 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-kl4n4" podStartSLOduration=25.48532196 podCreationTimestamp="2024-04-12 20:50:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 20:50:45.485291959 +0000 UTC m=+40.267166827" watchObservedRunningTime="2024-04-12 20:50:45.48532196 +0000 UTC m=+40.267196828" Apr 12 20:50:45.491000 audit[6384]: NETFILTER_CFG table=filter:105 family=2 entries=8 op=nft_register_rule pid=6384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:45.491000 audit[6384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcd843ab0 a2=0 a3=1 items=0 ppid=3947 pid=6384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:45.500000 audit[6384]: NETFILTER_CFG table=nat:106 family=2 entries=44 op=nft_register_rule pid=6384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:45.500000 audit[6384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffcd843ab0 a2=0 a3=1 items=0 ppid=3947 pid=6384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:45.513641 env[2117]: time="2024-04-12T20:50:45.513610598Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.514283 env[2117]: time="2024-04-12T20:50:45.514257949Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.515488 env[2117]: time="2024-04-12T20:50:45.515471607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.516220 env[2117]: time="2024-04-12T20:50:45.516198162Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:45.516663 env[2117]: time="2024-04-12T20:50:45.516644783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 20:50:45.518119 env[2117]: time="2024-04-12T20:50:45.518093213Z" level=info msg="CreateContainer within sandbox \"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 20:50:45.523825 env[2117]: time="2024-04-12T20:50:45.523797326Z" level=info msg="CreateContainer within sandbox \"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"35d54e49fc2a186488151ce0d1c83bc95c05e3bbd7cd433c71a51cdbbb31a455\"" Apr 12 20:50:45.524199 env[2117]: time="2024-04-12T20:50:45.524173704Z" level=info msg="StartContainer for \"35d54e49fc2a186488151ce0d1c83bc95c05e3bbd7cd433c71a51cdbbb31a455\"" Apr 12 20:50:45.539328 systemd[1]: Started cri-containerd-35d54e49fc2a186488151ce0d1c83bc95c05e3bbd7cd433c71a51cdbbb31a455.scope. Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6186 pid=6392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643534653439666332613138363438383135316365306431633833 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit: BPF prog-id=180 op=LOAD Apr 12 20:50:45.552000 audit[6392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6186 pid=6392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643534653439666332613138363438383135316365306431633833 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.552000 audit: BPF prog-id=181 op=LOAD Apr 12 20:50:45.552000 audit[6392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6186 pid=6392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643534653439666332613138363438383135316365306431633833 Apr 12 20:50:45.553000 audit: BPF prog-id=181 op=UNLOAD Apr 12 20:50:45.553000 audit: BPF prog-id=180 op=UNLOAD Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { perfmon } for pid=6392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit[6392]: AVC avc: denied { bpf } for pid=6392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:45.553000 audit: BPF prog-id=182 op=LOAD Apr 12 20:50:45.553000 audit[6392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6186 pid=6392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:45.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643534653439666332613138363438383135316365306431633833 Apr 12 20:50:45.563300 env[2117]: time="2024-04-12T20:50:45.563270781Z" level=info msg="StartContainer for \"35d54e49fc2a186488151ce0d1c83bc95c05e3bbd7cd433c71a51cdbbb31a455\" returns successfully" Apr 12 20:50:45.763596 systemd-networkd[1943]: cali5665a123e4b: Gained IPv6LL Apr 12 20:50:46.019555 systemd-networkd[1943]: cali8ab52b85a71: Gained IPv6LL Apr 12 20:50:46.379233 kubelet[3480]: I0412 20:50:46.379213 3480 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 20:50:46.379320 kubelet[3480]: I0412 20:50:46.379314 3480 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 20:50:46.489645 kubelet[3480]: I0412 20:50:46.489617 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-mzv5s" podStartSLOduration=20.495435706 podCreationTimestamp="2024-04-12 20:50:25 +0000 UTC" firstStartedPulling="2024-04-12 20:50:44.5226857 +0000 UTC m=+39.304560568" lastFinishedPulling="2024-04-12 20:50:45.516832512 +0000 UTC m=+40.298707380" observedRunningTime="2024-04-12 20:50:46.489397309 +0000 UTC m=+41.271272217" watchObservedRunningTime="2024-04-12 20:50:46.489582518 +0000 UTC m=+41.271457386" Apr 12 20:50:46.502000 audit[6440]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=6440 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:46.502000 audit[6440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffde18e3b0 a2=0 a3=1 items=0 ppid=3947 pid=6440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:46.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:46.515000 audit[6440]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=6440 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:46.515000 audit[6440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffde18e3b0 a2=0 a3=1 items=0 ppid=3947 pid=6440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:46.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:50.241949 kubelet[3480]: I0412 20:50:50.241875 3480 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 20:50:53.417000 audit[6503]: NETFILTER_CFG table=filter:109 family=2 entries=9 op=nft_register_rule pid=6503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.418777 kubelet[3480]: I0412 20:50:53.418756 3480 topology_manager.go:215] "Topology Admit Handler" podUID="4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3" podNamespace="calico-apiserver" podName="calico-apiserver-c48f469cb-kfbfc" Apr 12 20:50:53.421375 kubelet[3480]: I0412 20:50:53.421354 3480 topology_manager.go:215] "Topology Admit Handler" podUID="eae568ee-5d28-499e-b23c-23f2470fbaa9" podNamespace="calico-apiserver" podName="calico-apiserver-c48f469cb-l2pbl" Apr 12 20:50:53.423493 systemd[1]: Created slice kubepods-besteffort-pod4a0daaf2_44ca_47c8_9213_61fb9bfcb6a3.slice. Apr 12 20:50:53.426403 systemd[1]: Created slice kubepods-besteffort-podeae568ee_5d28_499e_b23c_23f2470fbaa9.slice. Apr 12 20:50:53.428947 kernel: kauditd_printk_skb: 505 callbacks suppressed Apr 12 20:50:53.429101 kernel: audit: type=1325 audit(1712955053.417:1319): table=filter:109 family=2 entries=9 op=nft_register_rule pid=6503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.417000 audit[6503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff31e6ed0 a2=0 a3=1 items=0 ppid=3947 pid=6503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.510615 kernel: audit: type=1300 audit(1712955053.417:1319): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff31e6ed0 a2=0 a3=1 items=0 ppid=3947 pid=6503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.510675 kernel: audit: type=1327 audit(1712955053.417:1319): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.526881 kubelet[3480]: I0412 20:50:53.526866 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eae568ee-5d28-499e-b23c-23f2470fbaa9-calico-apiserver-certs\") pod \"calico-apiserver-c48f469cb-l2pbl\" (UID: \"eae568ee-5d28-499e-b23c-23f2470fbaa9\") " pod="calico-apiserver/calico-apiserver-c48f469cb-l2pbl" Apr 12 20:50:53.526942 kubelet[3480]: I0412 20:50:53.526934 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r5svs\" (UniqueName: \"kubernetes.io/projected/eae568ee-5d28-499e-b23c-23f2470fbaa9-kube-api-access-r5svs\") pod \"calico-apiserver-c48f469cb-l2pbl\" (UID: \"eae568ee-5d28-499e-b23c-23f2470fbaa9\") " pod="calico-apiserver/calico-apiserver-c48f469cb-l2pbl" Apr 12 20:50:53.526972 kubelet[3480]: I0412 20:50:53.526962 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3-calico-apiserver-certs\") pod \"calico-apiserver-c48f469cb-kfbfc\" (UID: \"4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3\") " pod="calico-apiserver/calico-apiserver-c48f469cb-kfbfc" Apr 12 20:50:53.526998 kubelet[3480]: I0412 20:50:53.526984 3480 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cjshs\" (UniqueName: \"kubernetes.io/projected/4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3-kube-api-access-cjshs\") pod \"calico-apiserver-c48f469cb-kfbfc\" (UID: \"4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3\") " pod="calico-apiserver/calico-apiserver-c48f469cb-kfbfc" Apr 12 20:50:53.418000 audit[6503]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=6503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.418000 audit[6503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff31e6ed0 a2=0 a3=1 items=0 ppid=3947 pid=6503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.625653 kernel: audit: type=1325 audit(1712955053.418:1320): table=nat:110 family=2 entries=20 op=nft_register_rule pid=6503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.625706 kernel: audit: type=1300 audit(1712955053.418:1320): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff31e6ed0 a2=0 a3=1 items=0 ppid=3947 pid=6503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.653019 kernel: audit: type=1327 audit(1712955053.418:1320): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.550000 audit[6505]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=6505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.550000 audit[6505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff21fcfb0 a2=0 a3=1 items=0 ppid=3947 pid=6505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.725775 env[2117]: time="2024-04-12T20:50:53.725743520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c48f469cb-kfbfc,Uid:4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3,Namespace:calico-apiserver,Attempt:0,}" Apr 12 20:50:53.728404 env[2117]: time="2024-04-12T20:50:53.728365581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c48f469cb-l2pbl,Uid:eae568ee-5d28-499e-b23c-23f2470fbaa9,Namespace:calico-apiserver,Attempt:0,}" Apr 12 20:50:53.744895 kernel: audit: type=1325 audit(1712955053.550:1321): table=filter:111 family=2 entries=10 op=nft_register_rule pid=6505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.744948 kernel: audit: type=1300 audit(1712955053.550:1321): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff21fcfb0 a2=0 a3=1 items=0 ppid=3947 pid=6505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.744995 kernel: audit: type=1327 audit(1712955053.550:1321): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.662000 audit[6505]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=6505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.662000 audit[6505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff21fcfb0 a2=0 a3=1 items=0 ppid=3947 pid=6505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:53.803465 kernel: audit: type=1325 audit(1712955053.662:1322): table=nat:112 family=2 entries=20 op=nft_register_rule pid=6505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:53.813121 systemd-networkd[1943]: calie87bfdcfeb3: Link UP Apr 12 20:50:53.837691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 20:50:53.837721 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie87bfdcfeb3: link becomes ready Apr 12 20:50:53.837784 systemd-networkd[1943]: calie87bfdcfeb3: Gained carrier Apr 12 20:50:53.838685 systemd-networkd[1943]: calib126a609d7a: Link UP Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.759 [INFO][6510] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0 calico-apiserver-c48f469cb- calico-apiserver 4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3 808 0 2024-04-12 20:50:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c48f469cb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-aaaf4a72a0 calico-apiserver-c48f469cb-kfbfc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie87bfdcfeb3 [] []}} ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.759 [INFO][6510] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.781 [INFO][6539] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" HandleID="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.792 [INFO][6539] ipam_plugin.go 268: Auto assigning IP ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" HandleID="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003935e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-aaaf4a72a0", "pod":"calico-apiserver-c48f469cb-kfbfc", "timestamp":"2024-04-12 20:50:53.781739278 +0000 UTC"}, Hostname:"ci-3510.3.3-a-aaaf4a72a0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.792 [INFO][6539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.792 [INFO][6539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.792 [INFO][6539] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-aaaf4a72a0' Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.793 [INFO][6539] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.796 [INFO][6539] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.799 [INFO][6539] ipam.go 489: Trying affinity for 192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.800 [INFO][6539] ipam.go 155: Attempting to load block cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.802 [INFO][6539] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.802 [INFO][6539] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.28.0/26 handle="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.803 [INFO][6539] ipam.go 1682: Creating new handle: k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82 Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.806 [INFO][6539] ipam.go 1203: Writing block in order to claim IPs block=192.168.28.0/26 handle="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.809 [INFO][6539] ipam.go 1216: Successfully claimed IPs: [192.168.28.5/26] block=192.168.28.0/26 handle="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.809 [INFO][6539] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.28.5/26] handle="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.809 [INFO][6539] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:53.846069 env[2117]: 2024-04-12 20:50:53.809 [INFO][6539] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.28.5/26] IPv6=[] ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" HandleID="k8s-pod-network.8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.847214 env[2117]: 2024-04-12 20:50:53.811 [INFO][6510] k8s.go 385: Populated endpoint ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0", GenerateName:"calico-apiserver-c48f469cb-", Namespace:"calico-apiserver", SelfLink:"", UID:"4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c48f469cb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"", Pod:"calico-apiserver-c48f469cb-kfbfc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.28.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie87bfdcfeb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:53.847214 env[2117]: 2024-04-12 20:50:53.811 [INFO][6510] k8s.go 386: Calico CNI using IPs: [192.168.28.5/32] ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.847214 env[2117]: 2024-04-12 20:50:53.811 [INFO][6510] dataplane_linux.go 68: Setting the host side veth name to calie87bfdcfeb3 ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.847214 env[2117]: 2024-04-12 20:50:53.837 [INFO][6510] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.847214 env[2117]: 2024-04-12 20:50:53.838 [INFO][6510] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0", GenerateName:"calico-apiserver-c48f469cb-", Namespace:"calico-apiserver", SelfLink:"", UID:"4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c48f469cb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82", Pod:"calico-apiserver-c48f469cb-kfbfc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.28.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie87bfdcfeb3", MAC:"ee:eb:94:fc:4b:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:53.847214 env[2117]: 2024-04-12 20:50:53.844 [INFO][6510] k8s.go 498: Wrote updated endpoint to datastore ContainerID="8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-kfbfc" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--kfbfc-eth0" Apr 12 20:50:53.852312 systemd-networkd[1943]: calib126a609d7a: Gained carrier Apr 12 20:50:53.852466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib126a609d7a: link becomes ready Apr 12 20:50:53.855563 env[2117]: time="2024-04-12T20:50:53.855517123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:53.855563 env[2117]: time="2024-04-12T20:50:53.855555444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:53.855620 env[2117]: time="2024-04-12T20:50:53.855565725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:53.855708 env[2117]: time="2024-04-12T20:50:53.855689689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82 pid=6607 runtime=io.containerd.runc.v2 Apr 12 20:50:53.856000 audit[6614]: NETFILTER_CFG table=filter:113 family=2 entries=59 op=nft_register_chain pid=6614 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:53.856000 audit[6614]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=ffffdb3cf2b0 a2=0 a3=ffffad0cdfa8 items=0 ppid=5156 pid=6614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.856000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.763 [INFO][6521] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0 calico-apiserver-c48f469cb- calico-apiserver eae568ee-5d28-499e-b23c-23f2470fbaa9 810 0 2024-04-12 20:50:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c48f469cb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-aaaf4a72a0 calico-apiserver-c48f469cb-l2pbl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib126a609d7a [] []}} ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.763 [INFO][6521] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.785 [INFO][6544] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" HandleID="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.795 [INFO][6544] ipam_plugin.go 268: Auto assigning IP ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" HandleID="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003c3c80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-aaaf4a72a0", "pod":"calico-apiserver-c48f469cb-l2pbl", "timestamp":"2024-04-12 20:50:53.785549345 +0000 UTC"}, Hostname:"ci-3510.3.3-a-aaaf4a72a0", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.795 [INFO][6544] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.809 [INFO][6544] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.809 [INFO][6544] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-aaaf4a72a0' Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.810 [INFO][6544] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.813 [INFO][6544] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.816 [INFO][6544] ipam.go 489: Trying affinity for 192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.817 [INFO][6544] ipam.go 155: Attempting to load block cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.819 [INFO][6544] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.28.0/26 host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.819 [INFO][6544] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.28.0/26 handle="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.822 [INFO][6544] ipam.go 1682: Creating new handle: k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1 Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.825 [INFO][6544] ipam.go 1203: Writing block in order to claim IPs block=192.168.28.0/26 handle="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.828 [INFO][6544] ipam.go 1216: Successfully claimed IPs: [192.168.28.6/26] block=192.168.28.0/26 handle="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.828 [INFO][6544] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.28.6/26] handle="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" host="ci-3510.3.3-a-aaaf4a72a0" Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.829 [INFO][6544] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:50:53.858842 env[2117]: 2024-04-12 20:50:53.829 [INFO][6544] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.28.6/26] IPv6=[] ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" HandleID="k8s-pod-network.b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.859272 env[2117]: 2024-04-12 20:50:53.830 [INFO][6521] k8s.go 385: Populated endpoint ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0", GenerateName:"calico-apiserver-c48f469cb-", Namespace:"calico-apiserver", SelfLink:"", UID:"eae568ee-5d28-499e-b23c-23f2470fbaa9", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c48f469cb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"", Pod:"calico-apiserver-c48f469cb-l2pbl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.28.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib126a609d7a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:53.859272 env[2117]: 2024-04-12 20:50:53.831 [INFO][6521] k8s.go 386: Calico CNI using IPs: [192.168.28.6/32] ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.859272 env[2117]: 2024-04-12 20:50:53.831 [INFO][6521] dataplane_linux.go 68: Setting the host side veth name to calib126a609d7a ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.859272 env[2117]: 2024-04-12 20:50:53.852 [INFO][6521] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.859272 env[2117]: 2024-04-12 20:50:53.852 [INFO][6521] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0", GenerateName:"calico-apiserver-c48f469cb-", Namespace:"calico-apiserver", SelfLink:"", UID:"eae568ee-5d28-499e-b23c-23f2470fbaa9", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c48f469cb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1", Pod:"calico-apiserver-c48f469cb-l2pbl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.28.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib126a609d7a", MAC:"4a:62:68:f0:48:97", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:50:53.859272 env[2117]: 2024-04-12 20:50:53.857 [INFO][6521] k8s.go 498: Wrote updated endpoint to datastore ContainerID="b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1" Namespace="calico-apiserver" Pod="calico-apiserver-c48f469cb-l2pbl" WorkloadEndpoint="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--apiserver--c48f469cb--l2pbl-eth0" Apr 12 20:50:53.866480 systemd[1]: Started cri-containerd-8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82.scope. Apr 12 20:50:53.868226 env[2117]: time="2024-04-12T20:50:53.868184011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:50:53.868261 env[2117]: time="2024-04-12T20:50:53.868220373Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:50:53.868261 env[2117]: time="2024-04-12T20:50:53.868231893Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:50:53.868389 env[2117]: time="2024-04-12T20:50:53.868363618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1 pid=6645 runtime=io.containerd.runc.v2 Apr 12 20:50:53.876984 systemd[1]: Started cri-containerd-b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1.scope. Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.879000 audit: BPF prog-id=183 op=LOAD Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6607 pid=6619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323539396462323730373830656331313465663561376535373233 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6607 pid=6619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323539396462323730373830656331313465663561376535373233 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit: BPF prog-id=184 op=LOAD Apr 12 20:50:53.880000 audit[6619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6607 pid=6619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323539396462323730373830656331313465663561376535373233 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit: BPF prog-id=185 op=LOAD Apr 12 20:50:53.880000 audit[6619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6607 pid=6619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323539396462323730373830656331313465663561376535373233 Apr 12 20:50:53.880000 audit: BPF prog-id=185 op=UNLOAD Apr 12 20:50:53.880000 audit: BPF prog-id=184 op=UNLOAD Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { perfmon } for pid=6619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit[6619]: AVC avc: denied { bpf } for pid=6619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.880000 audit: BPF prog-id=186 op=LOAD Apr 12 20:50:53.880000 audit[6619]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6607 pid=6619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323539396462323730373830656331313465663561376535373233 Apr 12 20:50:53.887000 audit[6681]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=6681 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 20:50:53.887000 audit[6681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25080 a0=3 a1=ffffc950e010 a2=0 a3=ffff8f143fa8 items=0 ppid=5156 pid=6681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.887000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.890000 audit: BPF prog-id=187 op=LOAD Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6645 pid=6656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656539343461316463363530323532643238653339316266353661 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6645 pid=6656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656539343461316463363530323532643238653339316266353661 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit: BPF prog-id=188 op=LOAD Apr 12 20:50:53.891000 audit[6656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6645 pid=6656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656539343461316463363530323532643238653339316266353661 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit: BPF prog-id=189 op=LOAD Apr 12 20:50:53.891000 audit[6656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6645 pid=6656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656539343461316463363530323532643238653339316266353661 Apr 12 20:50:53.891000 audit: BPF prog-id=189 op=UNLOAD Apr 12 20:50:53.891000 audit: BPF prog-id=188 op=UNLOAD Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { perfmon } for pid=6656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit[6656]: AVC avc: denied { bpf } for pid=6656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:53.891000 audit: BPF prog-id=190 op=LOAD Apr 12 20:50:53.891000 audit[6656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6645 pid=6656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:53.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656539343461316463363530323532643238653339316266353661 Apr 12 20:50:53.894729 env[2117]: time="2024-04-12T20:50:53.894696513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c48f469cb-kfbfc,Uid:4a0daaf2-44ca-47c8-9213-61fb9bfcb6a3,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82\"" Apr 12 20:50:53.895805 env[2117]: time="2024-04-12T20:50:53.895784075Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 20:50:53.906593 env[2117]: time="2024-04-12T20:50:53.906560931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c48f469cb-l2pbl,Uid:eae568ee-5d28-499e-b23c-23f2470fbaa9,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1\"" Apr 12 20:50:54.979567 systemd-networkd[1943]: calie87bfdcfeb3: Gained IPv6LL Apr 12 20:50:55.043528 systemd-networkd[1943]: calib126a609d7a: Gained IPv6LL Apr 12 20:50:55.068532 env[2117]: time="2024-04-12T20:50:55.068495061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.069126 env[2117]: time="2024-04-12T20:50:55.069101043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.070203 env[2117]: time="2024-04-12T20:50:55.070181803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.071089 env[2117]: time="2024-04-12T20:50:55.071072156Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.071522 env[2117]: time="2024-04-12T20:50:55.071496252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 20:50:55.071923 env[2117]: time="2024-04-12T20:50:55.071906867Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 20:50:55.072991 env[2117]: time="2024-04-12T20:50:55.072969826Z" level=info msg="CreateContainer within sandbox \"8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 20:50:55.077589 env[2117]: time="2024-04-12T20:50:55.077563675Z" level=info msg="CreateContainer within sandbox \"8a2599db270780ec114ef5a7e5723f182b11f40f534e26ce6984297007592a82\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3196acc0cdb29e6d25c398a6fd1ba264462d7d0f41c7976c21d0146e06f4cf5f\"" Apr 12 20:50:55.077922 env[2117]: time="2024-04-12T20:50:55.077894248Z" level=info msg="StartContainer for \"3196acc0cdb29e6d25c398a6fd1ba264462d7d0f41c7976c21d0146e06f4cf5f\"" Apr 12 20:50:55.092477 systemd[1]: Started cri-containerd-3196acc0cdb29e6d25c398a6fd1ba264462d7d0f41c7976c21d0146e06f4cf5f.scope. Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit: BPF prog-id=191 op=LOAD Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6607 pid=6703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393661636330636462323965366432356333393861366664316261 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6607 pid=6703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393661636330636462323965366432356333393861366664316261 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.105000 audit: BPF prog-id=192 op=LOAD Apr 12 20:50:55.105000 audit[6703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6607 pid=6703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393661636330636462323965366432356333393861366664316261 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit: BPF prog-id=193 op=LOAD Apr 12 20:50:55.106000 audit[6703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6607 pid=6703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393661636330636462323965366432356333393861366664316261 Apr 12 20:50:55.106000 audit: BPF prog-id=193 op=UNLOAD Apr 12 20:50:55.106000 audit: BPF prog-id=192 op=UNLOAD Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { perfmon } for pid=6703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit[6703]: AVC avc: denied { bpf } for pid=6703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.106000 audit: BPF prog-id=194 op=LOAD Apr 12 20:50:55.106000 audit[6703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6607 pid=6703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393661636330636462323965366432356333393861366664316261 Apr 12 20:50:55.121311 env[2117]: time="2024-04-12T20:50:55.121281287Z" level=info msg="StartContainer for \"3196acc0cdb29e6d25c398a6fd1ba264462d7d0f41c7976c21d0146e06f4cf5f\" returns successfully" Apr 12 20:50:55.151106 env[2117]: time="2024-04-12T20:50:55.151079785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.151673 env[2117]: time="2024-04-12T20:50:55.151652487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.152647 env[2117]: time="2024-04-12T20:50:55.152628403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.153543 env[2117]: time="2024-04-12T20:50:55.153522676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 20:50:55.153995 env[2117]: time="2024-04-12T20:50:55.153976292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 20:50:55.155365 env[2117]: time="2024-04-12T20:50:55.155342543Z" level=info msg="CreateContainer within sandbox \"b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 20:50:55.159768 env[2117]: time="2024-04-12T20:50:55.159741305Z" level=info msg="CreateContainer within sandbox \"b3ee944a1dc650252d28e391bf56ad1ae8368e0aeef4be0f755d13f085bbe4c1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"00cc82f43f4c7a76337293389afe3a95870d5d9df79157586c4c80b79ee08046\"" Apr 12 20:50:55.160051 env[2117]: time="2024-04-12T20:50:55.160027915Z" level=info msg="StartContainer for \"00cc82f43f4c7a76337293389afe3a95870d5d9df79157586c4c80b79ee08046\"" Apr 12 20:50:55.172438 systemd[1]: Started cri-containerd-00cc82f43f4c7a76337293389afe3a95870d5d9df79157586c4c80b79ee08046.scope. Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit: BPF prog-id=195 op=LOAD Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6645 pid=6757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030636338326634336634633761373633333732393333383961666533 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6645 pid=6757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030636338326634336634633761373633333732393333383961666533 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.187000 audit: BPF prog-id=196 op=LOAD Apr 12 20:50:55.187000 audit[6757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6645 pid=6757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030636338326634336634633761373633333732393333383961666533 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit: BPF prog-id=197 op=LOAD Apr 12 20:50:55.188000 audit[6757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6645 pid=6757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030636338326634336634633761373633333732393333383961666533 Apr 12 20:50:55.188000 audit: BPF prog-id=197 op=UNLOAD Apr 12 20:50:55.188000 audit: BPF prog-id=196 op=UNLOAD Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { perfmon } for pid=6757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit[6757]: AVC avc: denied { bpf } for pid=6757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 20:50:55.188000 audit: BPF prog-id=198 op=LOAD Apr 12 20:50:55.188000 audit[6757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6645 pid=6757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030636338326634336634633761373633333732393333383961666533 Apr 12 20:50:55.203982 env[2117]: time="2024-04-12T20:50:55.203942614Z" level=info msg="StartContainer for \"00cc82f43f4c7a76337293389afe3a95870d5d9df79157586c4c80b79ee08046\" returns successfully" Apr 12 20:50:55.511273 kubelet[3480]: I0412 20:50:55.511244 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c48f469cb-kfbfc" podStartSLOduration=1.3350118260000001 podCreationTimestamp="2024-04-12 20:50:53 +0000 UTC" firstStartedPulling="2024-04-12 20:50:53.895545306 +0000 UTC m=+48.677420174" lastFinishedPulling="2024-04-12 20:50:55.071737821 +0000 UTC m=+49.853612729" observedRunningTime="2024-04-12 20:50:55.510126341 +0000 UTC m=+50.292001249" watchObservedRunningTime="2024-04-12 20:50:55.511204381 +0000 UTC m=+50.293079249" Apr 12 20:50:55.516977 kubelet[3480]: I0412 20:50:55.516960 3480 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c48f469cb-l2pbl" podStartSLOduration=1.270174456 podCreationTimestamp="2024-04-12 20:50:53 +0000 UTC" firstStartedPulling="2024-04-12 20:50:53.907352681 +0000 UTC m=+48.689227549" lastFinishedPulling="2024-04-12 20:50:55.154109537 +0000 UTC m=+49.935984405" observedRunningTime="2024-04-12 20:50:55.516791867 +0000 UTC m=+50.298666735" watchObservedRunningTime="2024-04-12 20:50:55.516931312 +0000 UTC m=+50.298806180" Apr 12 20:50:55.521000 audit[6805]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=6805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:55.521000 audit[6805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffda19a280 a2=0 a3=1 items=0 ppid=3947 pid=6805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:55.531000 audit[6805]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=6805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:55.531000 audit[6805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffda19a280 a2=0 a3=1 items=0 ppid=3947 pid=6805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:55.536000 audit[6807]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=6807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:55.536000 audit[6807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdfe05910 a2=0 a3=1 items=0 ppid=3947 pid=6807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:55.546000 audit[6807]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=6807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:50:55.546000 audit[6807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdfe05910 a2=0 a3=1 items=0 ppid=3947 pid=6807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:50:55.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:50:55.859000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:50:55.859000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6220 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:50:55.859000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:50:55.889000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:50:55.889000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003da600 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:50:55.889000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:51:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.135118 kernel: kauditd_printk_skb: 254 callbacks suppressed Apr 12 20:51:02.135304 kernel: audit: type=1400 audit(1712955062.123:1404): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.234175 kernel: audit: type=1400 audit(1712955062.123:1403): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4010c197d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.291035 kernel: audit: type=1300 audit(1712955062.123:1404): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4010c197d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.334649 kernel: audit: type=1400 audit(1712955062.123:1405): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.334708 kernel: audit: type=1300 audit(1712955062.123:1403): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007fd0ed0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007fd0ed0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.443449 kernel: audit: type=1327 audit(1712955062.123:1404): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.443537 kernel: audit: type=1327 audit(1712955062.123:1403): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400238e6a0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.552739 kernel: audit: type=1300 audit(1712955062.123:1405): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400238e6a0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.552768 kernel: audit: type=1327 audit(1712955062.123:1405): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.656790 kernel: audit: type=1400 audit(1712955062.124:1406): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4009c5c840 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40084fc000 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4010c19800 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:51:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:51:02.572000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.572000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40025152a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:02.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:02.572000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:02.572000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ee6600 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:02.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:05.278989 env[2117]: time="2024-04-12T20:51:05.278949984Z" level=info msg="StopPodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\"" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.313 [WARNING][6905] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0", GenerateName:"calico-kube-controllers-797954695c-", Namespace:"calico-system", SelfLink:"", UID:"db4c5592-c0b5-4583-a613-9e812d8442b3", ResourceVersion:"723", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"797954695c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16", Pod:"calico-kube-controllers-797954695c-s9lrd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.28.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia623be6d1be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.313 [INFO][6905] k8s.go 585: Cleaning up netns ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.313 [INFO][6905] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" iface="eth0" netns="" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.313 [INFO][6905] k8s.go 592: Releasing IP address(es) ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.313 [INFO][6905] utils.go 188: Calico CNI releasing IP address ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.330 [INFO][6924] ipam_plugin.go 415: Releasing address using handleID ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.330 [INFO][6924] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.330 [INFO][6924] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.338 [WARNING][6924] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.338 [INFO][6924] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.339 [INFO][6924] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.341680 env[2117]: 2024-04-12 20:51:05.340 [INFO][6905] k8s.go 598: Teardown processing complete. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.342151 env[2117]: time="2024-04-12T20:51:05.341702972Z" level=info msg="TearDown network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" successfully" Apr 12 20:51:05.342151 env[2117]: time="2024-04-12T20:51:05.341735093Z" level=info msg="StopPodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" returns successfully" Apr 12 20:51:05.342151 env[2117]: time="2024-04-12T20:51:05.342063183Z" level=info msg="RemovePodSandbox for \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\"" Apr 12 20:51:05.342151 env[2117]: time="2024-04-12T20:51:05.342096664Z" level=info msg="Forcibly stopping sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\"" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.374 [WARNING][6956] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0", GenerateName:"calico-kube-controllers-797954695c-", Namespace:"calico-system", SelfLink:"", UID:"db4c5592-c0b5-4583-a613-9e812d8442b3", ResourceVersion:"723", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"797954695c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"5c0fd365adf3b892575052b6b036efe4a3dc96a9d156ee557c9268cea0ab5c16", Pod:"calico-kube-controllers-797954695c-s9lrd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.28.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia623be6d1be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.375 [INFO][6956] k8s.go 585: Cleaning up netns ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.375 [INFO][6956] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" iface="eth0" netns="" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.375 [INFO][6956] k8s.go 592: Releasing IP address(es) ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.375 [INFO][6956] utils.go 188: Calico CNI releasing IP address ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.392 [INFO][6974] ipam_plugin.go 415: Releasing address using handleID ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.392 [INFO][6974] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.392 [INFO][6974] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.400 [WARNING][6974] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.400 [INFO][6974] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" HandleID="k8s-pod-network.9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-calico--kube--controllers--797954695c--s9lrd-eth0" Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.401 [INFO][6974] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.403994 env[2117]: 2024-04-12 20:51:05.402 [INFO][6956] k8s.go 598: Teardown processing complete. ContainerID="9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884" Apr 12 20:51:05.404362 env[2117]: time="2024-04-12T20:51:05.404019665Z" level=info msg="TearDown network for sandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" successfully" Apr 12 20:51:05.405768 env[2117]: time="2024-04-12T20:51:05.405744599Z" level=info msg="RemovePodSandbox \"9403c98f3f173afc221d4f66bc59e6b957adc601ac408d2330eaebceae7be884\" returns successfully" Apr 12 20:51:05.406419 env[2117]: time="2024-04-12T20:51:05.406400259Z" level=info msg="StopPodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\"" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.438 [WARNING][7002] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"dc02e469-9777-4ca3-9d95-d669589219b9", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1", Pod:"coredns-5dd5756b68-5g7kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35437bbec7c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.438 [INFO][7002] k8s.go 585: Cleaning up netns ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.438 [INFO][7002] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" iface="eth0" netns="" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.438 [INFO][7002] k8s.go 592: Releasing IP address(es) ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.438 [INFO][7002] utils.go 188: Calico CNI releasing IP address ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.456 [INFO][7023] ipam_plugin.go 415: Releasing address using handleID ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.456 [INFO][7023] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.456 [INFO][7023] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.464 [WARNING][7023] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.464 [INFO][7023] ipam_plugin.go 443: Releasing address using workloadID ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.465 [INFO][7023] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.467666 env[2117]: 2024-04-12 20:51:05.466 [INFO][7002] k8s.go 598: Teardown processing complete. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.467666 env[2117]: time="2024-04-12T20:51:05.467657880Z" level=info msg="TearDown network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" successfully" Apr 12 20:51:05.468108 env[2117]: time="2024-04-12T20:51:05.467683321Z" level=info msg="StopPodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" returns successfully" Apr 12 20:51:05.468108 env[2117]: time="2024-04-12T20:51:05.467936889Z" level=info msg="RemovePodSandbox for \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\"" Apr 12 20:51:05.468108 env[2117]: time="2024-04-12T20:51:05.467968250Z" level=info msg="Forcibly stopping sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\"" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.503 [WARNING][7057] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"dc02e469-9777-4ca3-9d95-d669589219b9", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"e7d860102bc21239612bf0cbbc6f7860cc5c794a13e0f989c7c0af4ac43c3ed1", Pod:"coredns-5dd5756b68-5g7kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35437bbec7c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.504 [INFO][7057] k8s.go 585: Cleaning up netns ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.504 [INFO][7057] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" iface="eth0" netns="" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.504 [INFO][7057] k8s.go 592: Releasing IP address(es) ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.504 [INFO][7057] utils.go 188: Calico CNI releasing IP address ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.520 [INFO][7076] ipam_plugin.go 415: Releasing address using handleID ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.521 [INFO][7076] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.521 [INFO][7076] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.528 [WARNING][7076] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.529 [INFO][7076] ipam_plugin.go 443: Releasing address using workloadID ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" HandleID="k8s-pod-network.318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--5g7kd-eth0" Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.530 [INFO][7076] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.532333 env[2117]: 2024-04-12 20:51:05.531 [INFO][7057] k8s.go 598: Teardown processing complete. ContainerID="318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024" Apr 12 20:51:05.532333 env[2117]: time="2024-04-12T20:51:05.532310206Z" level=info msg="TearDown network for sandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" successfully" Apr 12 20:51:05.533768 env[2117]: time="2024-04-12T20:51:05.533744691Z" level=info msg="RemovePodSandbox \"318d72963c4c3ef96d7ad0647067efe51242159feb59f4b84499a5b55a197024\" returns successfully" Apr 12 20:51:05.534001 env[2117]: time="2024-04-12T20:51:05.533978138Z" level=info msg="StopPodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\"" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.566 [WARNING][7110] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3b4baf9f-2461-4b9d-bfd4-0537e0f65971", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0", Pod:"coredns-5dd5756b68-kl4n4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ab52b85a71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.566 [INFO][7110] k8s.go 585: Cleaning up netns ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.566 [INFO][7110] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" iface="eth0" netns="" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.566 [INFO][7110] k8s.go 592: Releasing IP address(es) ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.566 [INFO][7110] utils.go 188: Calico CNI releasing IP address ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.583 [INFO][7130] ipam_plugin.go 415: Releasing address using handleID ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.583 [INFO][7130] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.583 [INFO][7130] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.591 [WARNING][7130] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.591 [INFO][7130] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.594 [INFO][7130] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.596447 env[2117]: 2024-04-12 20:51:05.595 [INFO][7110] k8s.go 598: Teardown processing complete. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.596834 env[2117]: time="2024-04-12T20:51:05.596485358Z" level=info msg="TearDown network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" successfully" Apr 12 20:51:05.596834 env[2117]: time="2024-04-12T20:51:05.596520319Z" level=info msg="StopPodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" returns successfully" Apr 12 20:51:05.596880 env[2117]: time="2024-04-12T20:51:05.596842689Z" level=info msg="RemovePodSandbox for \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\"" Apr 12 20:51:05.596902 env[2117]: time="2024-04-12T20:51:05.596875290Z" level=info msg="Forcibly stopping sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\"" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.628 [WARNING][7164] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3b4baf9f-2461-4b9d-bfd4-0537e0f65971", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"5218bd0a084978611124f64efc61db362d39ba487907954ae1b8b021570dd8f0", Pod:"coredns-5dd5756b68-kl4n4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.28.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ab52b85a71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.628 [INFO][7164] k8s.go 585: Cleaning up netns ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.628 [INFO][7164] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" iface="eth0" netns="" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.628 [INFO][7164] k8s.go 592: Releasing IP address(es) ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.628 [INFO][7164] utils.go 188: Calico CNI releasing IP address ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.645 [INFO][7181] ipam_plugin.go 415: Releasing address using handleID ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.645 [INFO][7181] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.645 [INFO][7181] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.652 [WARNING][7181] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.652 [INFO][7181] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" HandleID="k8s-pod-network.c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-coredns--5dd5756b68--kl4n4-eth0" Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.654 [INFO][7181] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.656278 env[2117]: 2024-04-12 20:51:05.655 [INFO][7164] k8s.go 598: Teardown processing complete. ContainerID="c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e" Apr 12 20:51:05.656753 env[2117]: time="2024-04-12T20:51:05.656292174Z" level=info msg="TearDown network for sandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" successfully" Apr 12 20:51:05.659302 env[2117]: time="2024-04-12T20:51:05.659277546Z" level=info msg="RemovePodSandbox \"c1c46bdfa67ea05d7768427f1f6c6a438537fb315636cf4ac22f3fb750ae962e\" returns successfully" Apr 12 20:51:05.659660 env[2117]: time="2024-04-12T20:51:05.659635837Z" level=info msg="StopPodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\"" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.692 [WARNING][7215] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"386139dc-a3a7-41a6-b819-7fdf0822e6a9", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb", Pod:"csi-node-driver-mzv5s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.28.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5665a123e4b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.692 [INFO][7215] k8s.go 585: Cleaning up netns ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.692 [INFO][7215] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" iface="eth0" netns="" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.692 [INFO][7215] k8s.go 592: Releasing IP address(es) ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.692 [INFO][7215] utils.go 188: Calico CNI releasing IP address ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.709 [INFO][7234] ipam_plugin.go 415: Releasing address using handleID ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.709 [INFO][7234] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.709 [INFO][7234] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.717 [WARNING][7234] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.717 [INFO][7234] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.719 [INFO][7234] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.721356 env[2117]: 2024-04-12 20:51:05.720 [INFO][7215] k8s.go 598: Teardown processing complete. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.721833 env[2117]: time="2024-04-12T20:51:05.721385914Z" level=info msg="TearDown network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" successfully" Apr 12 20:51:05.721833 env[2117]: time="2024-04-12T20:51:05.721421835Z" level=info msg="StopPodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" returns successfully" Apr 12 20:51:05.721833 env[2117]: time="2024-04-12T20:51:05.721775606Z" level=info msg="RemovePodSandbox for \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\"" Apr 12 20:51:05.721833 env[2117]: time="2024-04-12T20:51:05.721806527Z" level=info msg="Forcibly stopping sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\"" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.753 [WARNING][7266] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"386139dc-a3a7-41a6-b819-7fdf0822e6a9", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 20, 50, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-aaaf4a72a0", ContainerID:"713f0ac618e5cd0c21de64e926a20af3937874cd8c6faf32f27a8abb17b00deb", Pod:"csi-node-driver-mzv5s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.28.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5665a123e4b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.753 [INFO][7266] k8s.go 585: Cleaning up netns ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.753 [INFO][7266] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" iface="eth0" netns="" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.753 [INFO][7266] k8s.go 592: Releasing IP address(es) ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.753 [INFO][7266] utils.go 188: Calico CNI releasing IP address ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.770 [INFO][7284] ipam_plugin.go 415: Releasing address using handleID ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.770 [INFO][7284] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.770 [INFO][7284] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.778 [WARNING][7284] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.778 [INFO][7284] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" HandleID="k8s-pod-network.5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Workload="ci--3510.3.3--a--aaaf4a72a0-k8s-csi--node--driver--mzv5s-eth0" Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.779 [INFO][7284] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 20:51:05.781192 env[2117]: 2024-04-12 20:51:05.780 [INFO][7266] k8s.go 598: Teardown processing complete. ContainerID="5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601" Apr 12 20:51:05.781529 env[2117]: time="2024-04-12T20:51:05.781216610Z" level=info msg="TearDown network for sandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" successfully" Apr 12 20:51:05.783165 env[2117]: time="2024-04-12T20:51:05.783107709Z" level=info msg="RemovePodSandbox \"5b4800be9af34c71293730b57ce6f82e7fd5efb6f7556eb488e25c69b32ae601\" returns successfully" Apr 12 20:51:17.044000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.057429 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:51:17.057664 kernel: audit: type=1400 audit(1712955077.044:1411): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.044000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010391a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.160320 kernel: audit: type=1300 audit(1712955077.044:1411): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010391a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.160406 kernel: audit: type=1327 audit(1712955077.044:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:17.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:17.044000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.257481 kernel: audit: type=1400 audit(1712955077.044:1412): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.257571 kernel: audit: type=1300 audit(1712955077.044:1412): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001dba1a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.044000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001dba1a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.315957 kernel: audit: type=1327 audit(1712955077.044:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:17.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:17.045000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.412851 kernel: audit: type=1400 audit(1712955077.045:1413): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.045000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001097500 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.471189 kernel: audit: type=1300 audit(1712955077.045:1413): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001097500 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.471254 kernel: audit: type=1327 audit(1712955077.045:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:17.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:17.045000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.567988 kernel: audit: type=1400 audit(1712955077.045:1414): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:51:17.045000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001dba1c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:51:17.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:51:23.775000 audit[7392]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=7392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:23.788426 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:51:23.788604 kernel: audit: type=1325 audit(1712955083.775:1415): table=filter:119 family=2 entries=9 op=nft_register_rule pid=7392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:23.775000 audit[7392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe4f02d70 a2=0 a3=1 items=0 ppid=3947 pid=7392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:23.873339 kernel: audit: type=1300 audit(1712955083.775:1415): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe4f02d70 a2=0 a3=1 items=0 ppid=3947 pid=7392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:23.873384 kernel: audit: type=1327 audit(1712955083.775:1415): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:23.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:23.900000 audit[7392]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=7392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:23.900000 audit[7392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe4f02d70 a2=0 a3=1 items=0 ppid=3947 pid=7392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:23.986950 kernel: audit: type=1325 audit(1712955083.900:1416): table=nat:120 family=2 entries=27 op=nft_register_chain pid=7392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:23.987009 kernel: audit: type=1300 audit(1712955083.900:1416): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe4f02d70 a2=0 a3=1 items=0 ppid=3947 pid=7392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:23.987051 kernel: audit: type=1327 audit(1712955083.900:1416): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:23.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:24.020000 audit[7394]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=7394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:24.020000 audit[7394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc5b00280 a2=0 a3=1 items=0 ppid=3947 pid=7394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:24.106864 kernel: audit: type=1325 audit(1712955084.020:1417): table=filter:121 family=2 entries=8 op=nft_register_rule pid=7394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:24.106913 kernel: audit: type=1300 audit(1712955084.020:1417): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc5b00280 a2=0 a3=1 items=0 ppid=3947 pid=7394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:24.106967 kernel: audit: type=1327 audit(1712955084.020:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:24.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:24.135000 audit[7394]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=7394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:24.135000 audit[7394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc5b00280 a2=0 a3=1 items=0 ppid=3947 pid=7394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:51:24.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 20:51:24.166469 kernel: audit: type=1325 audit(1712955084.135:1418): table=nat:122 family=2 entries=34 op=nft_register_chain pid=7394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 20:51:55.860000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:51:55.872067 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:51:55.872228 kernel: audit: type=1400 audit(1712955115.860:1419): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:51:55.860000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010815c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:51:55.982535 kernel: audit: type=1300 audit(1712955115.860:1419): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010815c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:51:55.982597 kernel: audit: type=1327 audit(1712955115.860:1419): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:51:55.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:51:55.890000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:51:56.090034 kernel: audit: type=1400 audit(1712955115.890:1420): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:51:56.090095 kernel: audit: type=1300 audit(1712955115.890:1420): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400150ebe0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:51:55.890000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400150ebe0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:51:55.890000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:51:56.199293 kernel: audit: type=1327 audit(1712955115.890:1420): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:52:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4006d52e10 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.234255 kernel: audit: type=1400 audit(1712955122.124:1421): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.234294 kernel: audit: type=1300 audit(1712955122.124:1421): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4006d52e10 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.234346 kernel: audit: type=1327 audit(1712955122.124:1421): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.338517 kernel: audit: type=1400 audit(1712955122.124:1422): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.338584 kernel: audit: type=1300 audit(1712955122.124:1422): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4011013470 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4011013470 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.449956 kernel: audit: type=1327 audit(1712955122.124:1422): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.494788 kernel: audit: type=1400 audit(1712955122.124:1423): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.494887 kernel: audit: type=1300 audit(1712955122.124:1423): arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4007025e60 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4007025e60 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.606035 kernel: audit: type=1327 audit(1712955122.124:1423): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.606080 kernel: audit: type=1400 audit(1712955122.125:1424): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4006f08f60 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4006239de0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006f08f90 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:52:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:52:02.573000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.573000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f97830 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:02.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:02.573000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:02.573000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002037e80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:02.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:06.550845 systemd[1]: Started sshd@9-147.28.150.175:22-218.92.0.51:30690.service. Apr 12 20:52:06.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.150.175:22-218.92.0.51:30690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:06.798753 sshd[7574]: Unable to negotiate with 218.92.0.51 port 30690: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Apr 12 20:52:06.799528 systemd[1]: sshd@9-147.28.150.175:22-218.92.0.51:30690.service: Deactivated successfully. Apr 12 20:52:06.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.150.175:22-218.92.0.51:30690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:52:17.044000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.057559 kernel: kauditd_printk_skb: 16 callbacks suppressed Apr 12 20:52:17.057730 kernel: audit: type=1400 audit(1712955137.044:1431): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.044000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a94e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.160240 kernel: audit: type=1300 audit(1712955137.044:1431): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a94e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.160335 kernel: audit: type=1327 audit(1712955137.044:1431): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:17.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:17.044000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.257098 kernel: audit: type=1400 audit(1712955137.044:1432): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.257130 kernel: audit: type=1300 audit(1712955137.044:1432): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400099b960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.044000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400099b960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:17.367940 kernel: audit: type=1327 audit(1712955137.044:1432): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:17.368004 kernel: audit: type=1400 audit(1712955137.046:1433): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a9680 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.470362 kernel: audit: type=1300 audit(1712955137.046:1433): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a9680 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:17.522938 kernel: audit: type=1327 audit(1712955137.046:1433): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:17.522984 kernel: audit: type=1400 audit(1712955137.046:1434): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:52:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40011bb060 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:52:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:52:55.860000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:52:55.872626 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:52:55.872781 kernel: audit: type=1400 audit(1712955175.860:1435): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:52:55.860000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003dc040 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:52:55.983126 kernel: audit: type=1300 audit(1712955175.860:1435): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003dc040 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:52:55.983154 kernel: audit: type=1327 audit(1712955175.860:1435): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:52:55.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:52:55.926000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:52:56.090616 kernel: audit: type=1400 audit(1712955175.926:1436): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:52:56.090664 kernel: audit: type=1300 audit(1712955175.926:1436): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b3420 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:52:55.926000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b3420 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:52:55.926000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:52:56.199856 kernel: audit: type=1327 audit(1712955175.926:1436): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:53:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.221485 kernel: audit: type=1400 audit(1712955182.123:1437): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.221664 kernel: audit: type=1400 audit(1712955182.123:1438): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.221725 kernel: audit: type=1300 audit(1712955182.123:1437): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4014960150 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4014960150 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.332498 kernel: audit: type=1327 audit(1712955182.123:1437): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.332547 kernel: audit: type=1300 audit(1712955182.123:1438): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40149d2160 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40149d2160 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.443706 kernel: audit: type=1327 audit(1712955182.123:1438): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.443799 kernel: audit: type=1400 audit(1712955182.123:1439): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.123000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.123000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=40148c2540 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.553198 kernel: audit: type=1300 audit(1712955182.123:1439): arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=40148c2540 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.553289 kernel: audit: type=1327 audit(1712955182.123:1439): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.650787 kernel: audit: type=1400 audit(1712955182.124:1440): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401427d5e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401434c9f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=40148c2570 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:53:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:53:02.573000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.573000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:02.573000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40020987b0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:02.573000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d29760 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:02.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:02.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.045000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.058657 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:53:17.058802 kernel: audit: type=1400 audit(1712955197.045:1445): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.045000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca6e20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.161919 kernel: audit: type=1300 audit(1712955197.045:1445): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca6e20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.161973 kernel: audit: type=1327 audit(1712955197.045:1445): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.045000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.259380 kernel: audit: type=1400 audit(1712955197.045:1446): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.259453 kernel: audit: type=1300 audit(1712955197.045:1446): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242c420 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.045000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242c420 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.370950 kernel: audit: type=1327 audit(1712955197.045:1446): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.371019 kernel: audit: type=1400 audit(1712955197.046:1447): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca7040 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.473962 kernel: audit: type=1300 audit(1712955197.046:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca7040 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.473987 kernel: audit: type=1327 audit(1712955197.046:1447): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.571290 kernel: audit: type=1400 audit(1712955197.046:1448): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:53:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40026bb120 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:53:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:53:55.860000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:53:55.872876 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:53:55.873024 kernel: audit: type=1400 audit(1712955235.860:1449): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:53:55.860000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001080c60 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:53:55.983508 kernel: audit: type=1300 audit(1712955235.860:1449): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001080c60 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:53:55.983539 kernel: audit: type=1327 audit(1712955235.860:1449): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:53:55.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:53:55.926000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:53:56.091224 kernel: audit: type=1400 audit(1712955235.926:1450): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:53:56.091314 kernel: audit: type=1300 audit(1712955235.926:1450): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e421e0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:53:55.926000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e421e0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:53:56.147574 kernel: audit: type=1327 audit(1712955235.926:1450): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:53:55.926000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:54:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400f618810 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.235345 kernel: audit: type=1400 audit(1712955242.125:1451): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.235387 kernel: audit: type=1300 audit(1712955242.125:1451): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400f618810 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.288567 kernel: audit: type=1327 audit(1712955242.125:1451): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.288653 kernel: audit: type=1400 audit(1712955242.125:1452): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4007596260 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.391223 kernel: audit: type=1300 audit(1712955242.125:1452): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4007596260 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.391276 kernel: audit: type=1327 audit(1712955242.125:1452): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.495695 kernel: audit: type=1400 audit(1712955242.125:1453): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.495765 kernel: audit: type=1300 audit(1712955242.125:1453): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400f10c4e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400f10c4e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.607279 kernel: audit: type=1327 audit(1712955242.125:1453): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.607343 kernel: audit: type=1400 audit(1712955242.126:1454): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4012f40210 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4010c89320 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006fb06e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:54:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:54:02.575000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.575000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014c2540 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:02.575000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:02.575000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400123f110 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.059236 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:54:17.059404 kernel: audit: type=1400 audit(1712955257.047:1460): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.147778 kernel: audit: type=1400 audit(1712955257.047:1459): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.147822 kernel: audit: type=1300 audit(1712955257.047:1459): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400263b260 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400263b260 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014c35e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.264483 kernel: audit: type=1300 audit(1712955257.047:1460): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014c35e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.264542 kernel: audit: type=1327 audit(1712955257.047:1459): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.369857 kernel: audit: type=1327 audit(1712955257.047:1460): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.369913 kernel: audit: type=1400 audit(1712955257.047:1461): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014c3600 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.472442 kernel: audit: type=1300 audit(1712955257.047:1461): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014c3600 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.569289 kernel: audit: type=1327 audit(1712955257.047:1461): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:17.569333 kernel: audit: type=1400 audit(1712955257.047:1462): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:54:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=40006f3880 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:54:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:54:55.860000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:54:55.873811 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:54:55.873963 kernel: audit: type=1400 audit(1712955295.860:1463): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:54:55.860000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001081ee0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:54:55.984392 kernel: audit: type=1300 audit(1712955295.860:1463): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001081ee0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:54:55.984531 kernel: audit: type=1327 audit(1712955295.860:1463): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:54:55.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:54:55.927000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:54:56.092080 kernel: audit: type=1400 audit(1712955295.927:1464): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:54:56.092152 kernel: audit: type=1300 audit(1712955295.927:1464): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400150e400 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:54:55.927000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400150e400 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:54:55.927000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:54:56.201433 kernel: audit: type=1327 audit(1712955295.927:1464): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:55:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40067aa180 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.235446 kernel: audit: type=1400 audit(1712955302.124:1465): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.235592 kernel: audit: type=1300 audit(1712955302.124:1465): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40067aa180 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.235675 kernel: audit: type=1327 audit(1712955302.124:1465): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.333069 kernel: audit: type=1400 audit(1712955302.125:1466): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.333117 kernel: audit: type=1300 audit(1712955302.125:1466): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400bf45600 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400bf45600 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.444228 kernel: audit: type=1327 audit(1712955302.125:1466): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.444346 kernel: audit: type=1400 audit(1712955302.125:1467): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4011189ec0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.553827 kernel: audit: type=1300 audit(1712955302.125:1467): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4011189ec0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.553863 kernel: audit: type=1327 audit(1712955302.125:1467): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.658488 kernel: audit: type=1400 audit(1712955302.126:1468): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400eed5c50 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400616f500 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4010b9cc30 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:55:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:55:02.575000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.575000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40025b2870 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:02.575000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:02.575000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011bb9e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:05.315669 kubelet[3480]: W0412 20:55:05.315639 3480 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 20:55:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.059502 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:55:17.059681 kernel: audit: type=1400 audit(1712955317.046:1473): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001039020 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.162141 kernel: audit: type=1300 audit(1712955317.046:1473): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001039020 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.162195 kernel: audit: type=1327 audit(1712955317.046:1473): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.259027 kernel: audit: type=1400 audit(1712955317.046:1474): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.259061 kernel: audit: type=1300 audit(1712955317.046:1474): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400263b400 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400263b400 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:17.370033 kernel: audit: type=1327 audit(1712955317.046:1474): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:17.370106 kernel: audit: type=1400 audit(1712955317.046:1475): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40006f3bc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.472489 kernel: audit: type=1300 audit(1712955317.046:1475): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40006f3bc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.472559 kernel: audit: type=1327 audit(1712955317.046:1475): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:17.046000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.569282 kernel: audit: type=1400 audit(1712955317.046:1476): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:55:17.046000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40011bba00 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:55:17.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:55:55.862000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:55:55.874721 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:55:55.874931 kernel: audit: type=1400 audit(1712955355.862:1477): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:55:55.862000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c000 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:55:55.985231 kernel: audit: type=1300 audit(1712955355.862:1477): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c000 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:55:55.985313 kernel: audit: type=1327 audit(1712955355.862:1477): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:55:55.862000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:55:55.928000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:55:56.092755 kernel: audit: type=1400 audit(1712955355.928:1478): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:55:56.092837 kernel: audit: type=1300 audit(1712955355.928:1478): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2080 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:55:55.928000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2080 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:55:55.928000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:55:56.202037 kernel: audit: type=1327 audit(1712955355.928:1478): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:56:02.124000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.124000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400c08c1e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.235925 kernel: audit: type=1400 audit(1712955362.124:1479): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.236109 kernel: audit: type=1300 audit(1712955362.124:1479): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400c08c1e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.236201 kernel: audit: type=1327 audit(1712955362.124:1479): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.333640 kernel: audit: type=1400 audit(1712955362.125:1481): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.333730 kernel: audit: type=1300 audit(1712955362.125:1481): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4005b4da40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4005b4da40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.445010 kernel: audit: type=1327 audit(1712955362.125:1481): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.445117 kernel: audit: type=1400 audit(1712955362.125:1480): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400f619800 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.554791 kernel: audit: type=1300 audit(1712955362.125:1480): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400f619800 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.554847 kernel: audit: type=1327 audit(1712955362.125:1480): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.652485 kernel: audit: type=1400 audit(1712955362.126:1482): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005d63d20 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400c08c210 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4010f14b70 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:56:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:56:02.575000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.575000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002099500 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:02.575000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:02.575000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242c560 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:02.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.060659 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:56:17.060872 kernel: audit: type=1400 audit(1712955377.047:1487): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.149695 kernel: audit: type=1400 audit(1712955377.047:1488): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.149761 kernel: audit: type=1300 audit(1712955377.047:1487): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010390e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010390e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.208402 kernel: audit: type=1400 audit(1712955377.047:1489): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000b4f3a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.311412 kernel: audit: type=1300 audit(1712955377.047:1488): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000b4f3a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.311507 kernel: audit: type=1327 audit(1712955377.047:1488): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.364305 kernel: audit: type=1327 audit(1712955377.047:1487): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400242cb20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.475851 kernel: audit: type=1300 audit(1712955377.047:1489): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400242cb20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.475964 kernel: audit: type=1400 audit(1712955377.047:1490): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.047000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:56:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.573095 kernel: audit: type=1327 audit(1712955377.047:1489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:17.047000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=40014c2fc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:56:17.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:56:55.863000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:56:55.874972 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:56:55.875121 kernel: audit: type=1400 audit(1712955415.863:1491): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:56:55.863000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003dc040 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:56:55.984914 kernel: audit: type=1300 audit(1712955415.863:1491): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003dc040 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:56:55.984993 kernel: audit: type=1327 audit(1712955415.863:1491): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:56:55.863000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:56:55.929000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:56:56.092090 kernel: audit: type=1400 audit(1712955415.929:1492): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:56:56.092165 kernel: audit: type=1300 audit(1712955415.929:1492): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc03c0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:56:55.929000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc03c0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:56:56.148209 kernel: audit: type=1327 audit(1712955415.929:1492): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:56:55.929000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:57:02.125000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.125000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008fd8870 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.236447 kernel: audit: type=1400 audit(1712955422.125:1493): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.236629 kernel: audit: type=1300 audit(1712955422.125:1493): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008fd8870 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.236671 kernel: audit: type=1327 audit(1712955422.125:1493): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.341137 kernel: audit: type=1400 audit(1712955422.126:1494): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.341228 kernel: audit: type=1300 audit(1712955422.126:1494): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008fd88d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008fd88d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.452807 kernel: audit: type=1327 audit(1712955422.126:1494): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.452884 kernel: audit: type=1400 audit(1712955422.126:1495): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400fce5f00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.556009 kernel: audit: type=1300 audit(1712955422.126:1495): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400fce5f00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.556091 kernel: audit: type=1327 audit(1712955422.126:1495): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.176000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.653784 kernel: audit: type=1400 audit(1712955422.176:1496): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.176000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006239be0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.176000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40092bcd50 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400bdee4b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:57:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:57:02.576000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.576000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40017e73e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:02.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:02.576000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:02.576000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400125b1a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:02.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.048000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.061357 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:57:17.061541 kernel: audit: type=1400 audit(1712955437.048:1501): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.048000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.150378 kernel: audit: type=1400 audit(1712955437.048:1502): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.150464 kernel: audit: type=1300 audit(1712955437.048:1501): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400242cf20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.048000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400242cf20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.048000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.253431 kernel: audit: type=1400 audit(1712955437.048:1503): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.253523 kernel: audit: type=1300 audit(1712955437.048:1502): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40022cb6e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.048000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40022cb6e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.364828 kernel: audit: type=1327 audit(1712955437.048:1502): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.364927 kernel: audit: type=1327 audit(1712955437.048:1501): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.048000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002514d60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.476388 kernel: audit: type=1300 audit(1712955437.048:1503): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002514d60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.476478 kernel: audit: type=1400 audit(1712955437.048:1504): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.048000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:57:17.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.573668 kernel: audit: type=1327 audit(1712955437.048:1503): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:17.048000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=40014c2fc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:57:17.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:57:55.864471 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:57:55.864922 kernel: audit: type=1400 audit(1712955475.862:1505): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:57:55.862000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:57:55.862000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001080100 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:57:55.985688 kernel: audit: type=1300 audit(1712955475.862:1505): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001080100 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:57:55.985806 kernel: audit: type=1327 audit(1712955475.862:1505): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:57:55.862000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:57:56.038482 kernel: audit: type=1400 audit(1712955475.929:1506): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:57:55.929000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:57:55.929000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ffa520 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:57:56.149016 kernel: audit: type=1300 audit(1712955475.929:1506): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ffa520 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:57:56.149072 kernel: audit: type=1327 audit(1712955475.929:1506): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:57:55.929000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:58:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40149f66c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.237051 kernel: audit: type=1400 audit(1712955482.126:1507): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.237219 kernel: audit: type=1300 audit(1712955482.126:1507): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40149f66c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.237260 kernel: audit: type=1327 audit(1712955482.126:1507): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.127000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.334586 kernel: audit: type=1400 audit(1712955482.127:1508): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.334672 kernel: audit: type=1300 audit(1712955482.127:1508): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40054a0b20 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.127000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40054a0b20 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.445849 kernel: audit: type=1327 audit(1712955482.127:1508): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.445944 kernel: audit: type=1400 audit(1712955482.127:1509): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.127000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.127000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401512b620 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.555991 kernel: audit: type=1300 audit(1712955482.127:1509): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401512b620 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.556034 kernel: audit: type=1327 audit(1712955482.127:1509): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.661618 kernel: audit: type=1400 audit(1712955482.177:1510): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401151cbd0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40071bef40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40149f66f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:58:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:58:02.576000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.576000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d143f0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:02.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:02.576000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:02.576000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca63a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:02.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:10.034970 update_engine[2107]: I0412 20:58:10.034878 2107 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 20:58:10.034970 update_engine[2107]: I0412 20:58:10.034919 2107 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 20:58:10.035714 update_engine[2107]: I0412 20:58:10.035627 2107 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 20:58:10.035980 update_engine[2107]: I0412 20:58:10.035966 2107 omaha_request_params.cc:62] Current group set to lts Apr 12 20:58:10.036113 update_engine[2107]: I0412 20:58:10.036103 2107 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 20:58:10.036113 update_engine[2107]: I0412 20:58:10.036108 2107 update_attempter.cc:643] Scheduling an action processor start. Apr 12 20:58:10.036198 update_engine[2107]: I0412 20:58:10.036123 2107 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:58:10.036198 update_engine[2107]: I0412 20:58:10.036146 2107 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 20:58:10.036779 update_engine[2107]: I0412 20:58:10.036764 2107 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:58:10.036779 update_engine[2107]: I0412 20:58:10.036775 2107 omaha_request_action.cc:271] Request: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: Apr 12 20:58:10.036779 update_engine[2107]: I0412 20:58:10.036779 2107 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:58:10.037630 locksmithd[2140]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 20:58:10.037953 update_engine[2107]: I0412 20:58:10.037940 2107 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:58:10.038023 update_engine[2107]: E0412 20:58:10.038015 2107 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:58:10.038075 update_engine[2107]: I0412 20:58:10.038067 2107 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 20:58:17.049000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.062283 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:58:17.062466 kernel: audit: type=1400 audit(1712955497.049:1515): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.049000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca7320 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.164964 kernel: audit: type=1300 audit(1712955497.049:1515): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca7320 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.165034 kernel: audit: type=1327 audit(1712955497.049:1515): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:17.049000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:17.049000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.261869 kernel: audit: type=1400 audit(1712955497.049:1516): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.261927 kernel: audit: type=1400 audit(1712955497.049:1517): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.049000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.049000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee3b80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.364406 kernel: audit: type=1300 audit(1712955497.049:1516): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee3b80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.364491 kernel: audit: type=1327 audit(1712955497.049:1516): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:17.049000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:17.049000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40026ba960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.475397 kernel: audit: type=1300 audit(1712955497.049:1517): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40026ba960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.475491 kernel: audit: type=1327 audit(1712955497.049:1517): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:17.049000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:17.049000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.572291 kernel: audit: type=1400 audit(1712955497.049:1518): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:58:17.049000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=40021a9640 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:58:17.049000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:58:20.012911 update_engine[2107]: I0412 20:58:20.012871 2107 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:58:20.013296 update_engine[2107]: I0412 20:58:20.013084 2107 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:58:20.013296 update_engine[2107]: E0412 20:58:20.013157 2107 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:58:20.013296 update_engine[2107]: I0412 20:58:20.013212 2107 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 20:58:30.015324 update_engine[2107]: I0412 20:58:30.015275 2107 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:58:30.015767 update_engine[2107]: I0412 20:58:30.015516 2107 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:58:30.015767 update_engine[2107]: E0412 20:58:30.015614 2107 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:58:30.015767 update_engine[2107]: I0412 20:58:30.015671 2107 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 20:58:40.014802 update_engine[2107]: I0412 20:58:40.014763 2107 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.014956 2107 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:58:40.015231 update_engine[2107]: E0412 20:58:40.015051 2107 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015106 2107 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015111 2107 omaha_request_action.cc:621] Omaha request response: Apr 12 20:58:40.015231 update_engine[2107]: E0412 20:58:40.015174 2107 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015183 2107 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015187 2107 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015189 2107 update_attempter.cc:306] Processing Done. Apr 12 20:58:40.015231 update_engine[2107]: E0412 20:58:40.015201 2107 update_attempter.cc:619] Update failed. Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015203 2107 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015206 2107 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 20:58:40.015231 update_engine[2107]: I0412 20:58:40.015210 2107 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015269 2107 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015285 2107 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015287 2107 omaha_request_action.cc:271] Request: Apr 12 20:58:40.015497 update_engine[2107]: Apr 12 20:58:40.015497 update_engine[2107]: Apr 12 20:58:40.015497 update_engine[2107]: Apr 12 20:58:40.015497 update_engine[2107]: Apr 12 20:58:40.015497 update_engine[2107]: Apr 12 20:58:40.015497 update_engine[2107]: Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015290 2107 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015367 2107 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:58:40.015497 update_engine[2107]: E0412 20:58:40.015409 2107 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015450 2107 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015453 2107 omaha_request_action.cc:621] Omaha request response: Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015463 2107 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015467 2107 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015470 2107 update_attempter.cc:306] Processing Done. Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015472 2107 update_attempter.cc:310] Error event sent. Apr 12 20:58:40.015497 update_engine[2107]: I0412 20:58:40.015480 2107 update_check_scheduler.cc:74] Next update check in 49m42s Apr 12 20:58:40.015869 locksmithd[2140]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 20:58:40.015869 locksmithd[2140]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 20:58:55.863000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:58:55.876699 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:58:55.876835 kernel: audit: type=1400 audit(1712955535.863:1519): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:58:55.863000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c880 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:58:55.987411 kernel: audit: type=1300 audit(1712955535.863:1519): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c880 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:58:55.987492 kernel: audit: type=1327 audit(1712955535.863:1519): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:58:55.863000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:58:55.930000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:58:56.095076 kernel: audit: type=1400 audit(1712955535.930:1520): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:58:56.095113 kernel: audit: type=1300 audit(1712955535.930:1520): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005314a0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:58:55.930000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005314a0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:58:55.930000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:58:56.204543 kernel: audit: type=1327 audit(1712955535.930:1520): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:59:02.126000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.126000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40149f7920 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.237946 kernel: audit: type=1400 audit(1712955542.126:1521): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.238005 kernel: audit: type=1300 audit(1712955542.126:1521): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40149f7920 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.238085 kernel: audit: type=1327 audit(1712955542.126:1521): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.127000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.335822 kernel: audit: type=1400 audit(1712955542.127:1522): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.127000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40066d1ea0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.393906 kernel: audit: type=1300 audit(1712955542.127:1522): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40066d1ea0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.394117 kernel: audit: type=1327 audit(1712955542.127:1522): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.128000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.498863 kernel: audit: type=1400 audit(1712955542.128:1523): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.128000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40149f7980 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.557276 kernel: audit: type=1300 audit(1712955542.128:1523): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40149f7980 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.610624 kernel: audit: type=1327 audit(1712955542.128:1523): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.610685 kernel: audit: type=1400 audit(1712955542.177:1524): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4005727d40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400902a210 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.177000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.177000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400dad0b10 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 20:59:02.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 20:59:02.577000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.577000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:02.577000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c2400 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:02.577000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400123e9f0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:02.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:02.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.050000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.062596 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 20:59:17.062788 kernel: audit: type=1400 audit(1712955557.050:1529): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.050000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb7ee0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.165867 kernel: audit: type=1300 audit(1712955557.050:1529): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb7ee0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.165922 kernel: audit: type=1327 audit(1712955557.050:1529): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.050000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.263388 kernel: audit: type=1400 audit(1712955557.050:1530): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.263466 kernel: audit: type=1300 audit(1712955557.050:1530): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c3c80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.050000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c3c80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.374989 kernel: audit: type=1327 audit(1712955557.050:1530): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.375033 kernel: audit: type=1400 audit(1712955557.050:1531): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.050000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.050000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb7f00 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.050000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.478104 kernel: audit: type=1300 audit(1712955557.050:1531): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb7f00 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.478137 kernel: audit: type=1327 audit(1712955557.050:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:17.478237 kernel: audit: type=1400 audit(1712955557.050:1532): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 20:59:17.050000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000ee2f40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 20:59:17.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 20:59:20.256350 systemd[1]: run-containerd-runc-k8s.io-56836b7346c61265eb37d52f041c083c1eb9d0d146aa605df6c0389ca0db3bf3-runc.uXYoFi.mount: Deactivated successfully. Apr 12 20:59:55.864000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:59:55.877201 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 20:59:55.877373 kernel: audit: type=1400 audit(1712955595.864:1533): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 20:59:55.864000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a0000 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:59:55.987779 kernel: audit: type=1300 audit(1712955595.864:1533): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a0000 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 20:59:55.987857 kernel: audit: type=1327 audit(1712955595.864:1533): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:59:55.864000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:59:55.930000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:59:56.095249 kernel: audit: type=1400 audit(1712955595.930:1534): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 20:59:56.095345 kernel: audit: type=1300 audit(1712955595.930:1534): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400150e160 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:59:55.930000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400150e160 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 20:59:55.930000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 20:59:56.204491 kernel: audit: type=1327 audit(1712955595.930:1534): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:00:02.127000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.127000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40155261e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.238831 kernel: audit: type=1400 audit(1712955602.127:1535): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.238972 kernel: audit: type=1300 audit(1712955602.127:1535): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40155261e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.239040 kernel: audit: type=1327 audit(1712955602.127:1535): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.128000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.343479 kernel: audit: type=1400 audit(1712955602.128:1536): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.343556 kernel: audit: type=1300 audit(1712955602.128:1536): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40044f1500 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.128000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40044f1500 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.454813 kernel: audit: type=1327 audit(1712955602.128:1536): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.454845 kernel: audit: type=1400 audit(1712955602.129:1537): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.129000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.129000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008ef0720 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.557829 kernel: audit: type=1300 audit(1712955602.129:1537): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008ef0720 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.557865 kernel: audit: type=1327 audit(1712955602.129:1537): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.178000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.655518 kernel: audit: type=1400 audit(1712955602.178:1538): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.178000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.178000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4014961a10 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.178000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.178000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4010a8b760 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.178000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=401151c8d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:00:02.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:00:02.577000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.577000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d15ad0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:02.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:02.577000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:02.577000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010966a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:02.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:05.316652 kubelet[3480]: W0412 21:00:05.316626 3480 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 21:00:17.050000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.063050 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:00:17.063237 kernel: audit: type=1400 audit(1712955617.050:1543): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.050000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400125ad80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.166416 kernel: audit: type=1300 audit(1712955617.050:1543): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400125ad80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.166503 kernel: audit: type=1327 audit(1712955617.050:1543): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:17.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:17.050000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.264117 kernel: audit: type=1400 audit(1712955617.050:1544): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.264150 kernel: audit: type=1300 audit(1712955617.050:1544): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a8040 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.050000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a8040 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.050000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:17.375742 kernel: audit: type=1327 audit(1712955617.050:1544): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:17.375787 kernel: audit: type=1400 audit(1712955617.051:1545): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.051000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.051000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40011bad20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.478812 kernel: audit: type=1300 audit(1712955617.051:1545): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40011bad20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.478839 kernel: audit: type=1327 audit(1712955617.051:1545): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:17.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:17.051000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.576140 kernel: audit: type=1400 audit(1712955617.051:1546): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:00:17.051000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=4001096bc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:00:17.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:00:55.864000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:00:55.877395 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:00:55.877535 kernel: audit: type=1400 audit(1712955655.864:1547): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:00:55.864000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139dfc0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:00:55.988006 kernel: audit: type=1300 audit(1712955655.864:1547): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139dfc0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:00:55.988068 kernel: audit: type=1327 audit(1712955655.864:1547): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:00:55.864000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:00:55.931000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:00:56.095537 kernel: audit: type=1400 audit(1712955655.931:1548): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:00:55.931000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc1020 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:00:56.151857 kernel: audit: type=1300 audit(1712955655.931:1548): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc1020 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:00:56.151878 kernel: audit: type=1327 audit(1712955655.931:1548): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:00:55.931000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:01:02.128000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.128000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006906660 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.239440 kernel: audit: type=1400 audit(1712955662.128:1549): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.239582 kernel: audit: type=1300 audit(1712955662.128:1549): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006906660 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.239642 kernel: audit: type=1327 audit(1712955662.128:1549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.129000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.337200 kernel: audit: type=1400 audit(1712955662.129:1550): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.337252 kernel: audit: type=1300 audit(1712955662.129:1550): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4009b5c6c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.129000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4009b5c6c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.129000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.446970 kernel: audit: type=1400 audit(1712955662.129:1551): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.447060 kernel: audit: type=1327 audit(1712955662.129:1550): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.129000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008edd8f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.558640 kernel: audit: type=1300 audit(1712955662.129:1551): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008edd8f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.558738 kernel: audit: type=1327 audit(1712955662.129:1551): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.178000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.663849 kernel: audit: type=1400 audit(1712955662.178:1552): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.178000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008edd9b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.178000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.178000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40107a31e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.178000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.178000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008edd9e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:01:02.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:01:02.579000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.579000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022aba70 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:02.579000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:02.579000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001096da0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:02.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.064034 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:01:17.064235 kernel: audit: type=1400 audit(1712955677.052:1557): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a9ba0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.166823 kernel: audit: type=1300 audit(1712955677.052:1557): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a9ba0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.166869 kernel: audit: type=1327 audit(1712955677.052:1557): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.263810 kernel: audit: type=1400 audit(1712955677.052:1558): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.263851 kernel: audit: type=1300 audit(1712955677.052:1558): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010970a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010970a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.374879 kernel: audit: type=1327 audit(1712955677.052:1558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.374968 kernel: audit: type=1400 audit(1712955677.052:1559): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40006f2000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.477402 kernel: audit: type=1300 audit(1712955677.052:1559): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40006f2000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.477514 kernel: audit: type=1327 audit(1712955677.052:1559): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.574216 kernel: audit: type=1400 audit(1712955677.052:1560): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:01:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a8000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:01:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:01:55.866000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:01:55.878071 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:01:55.878211 kernel: audit: type=1400 audit(1712955715.866:1561): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:01:55.866000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a19e0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:01:55.988665 kernel: audit: type=1300 audit(1712955715.866:1561): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a19e0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:01:55.988727 kernel: audit: type=1327 audit(1712955715.866:1561): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:01:55.866000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:01:55.933000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:01:56.096448 kernel: audit: type=1400 audit(1712955715.933:1562): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:01:56.096483 kernel: audit: type=1300 audit(1712955715.933:1562): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e42320 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:01:55.933000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e42320 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:01:55.933000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:01:56.206143 kernel: audit: type=1327 audit(1712955715.933:1562): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:02:02.130000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.130000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400672cde0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.240266 kernel: audit: type=1400 audit(1712955722.130:1563): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.240314 kernel: audit: type=1300 audit(1712955722.130:1563): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400672cde0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.240368 kernel: audit: type=1327 audit(1712955722.130:1563): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.338102 kernel: audit: type=1400 audit(1712955722.131:1565): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.338203 kernel: audit: type=1400 audit(1712955722.131:1564): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400268dec0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.447967 kernel: audit: type=1300 audit(1712955722.131:1565): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400268dec0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.501468 kernel: audit: type=1327 audit(1712955722.131:1565): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40054004b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.559982 kernel: audit: type=1300 audit(1712955722.131:1564): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40054004b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.560055 kernel: audit: type=1327 audit(1712955722.131:1564): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.180000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.658033 kernel: audit: type=1400 audit(1712955722.180:1566): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.180000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400572af00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.180000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.180000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4010c88060 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.180000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.180000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40060fc180 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:02:02.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:02:02.580000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.580000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014c3120 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:02.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:02.580000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:02.580000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee6a20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:02.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.064694 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:02:17.064880 kernel: audit: type=1400 audit(1712955737.052:1571): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026ba1e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.168344 kernel: audit: type=1300 audit(1712955737.052:1571): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026ba1e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.168413 kernel: audit: type=1327 audit(1712955737.052:1571): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.266089 kernel: audit: type=1400 audit(1712955737.052:1572): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.266170 kernel: audit: type=1400 audit(1712955737.052:1573): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a9960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.369393 kernel: audit: type=1300 audit(1712955737.052:1572): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a9960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.369456 kernel: audit: type=1327 audit(1712955737.052:1572): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400242d460 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.481206 kernel: audit: type=1300 audit(1712955737.052:1573): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400242d460 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.534246 kernel: audit: type=1327 audit(1712955737.052:1573): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:17.534328 kernel: audit: type=1400 audit(1712955737.052:1574): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:02:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=40006f2080 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:02:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:02:55.867000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:02:55.879119 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:02:55.879319 kernel: audit: type=1400 audit(1712955775.867:1575): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:02:55.867000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6900 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:02:55.989835 kernel: audit: type=1300 audit(1712955775.867:1575): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6900 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:02:55.989927 kernel: audit: type=1327 audit(1712955775.867:1575): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:02:55.867000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:02:55.933000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:02:56.097550 kernel: audit: type=1400 audit(1712955775.933:1576): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:02:56.097655 kernel: audit: type=1300 audit(1712955775.933:1576): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2020 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:02:55.933000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2020 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:02:55.933000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:02:56.207039 kernel: audit: type=1327 audit(1712955775.933:1576): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:03:02.130000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.130000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008ee9260 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.240605 kernel: audit: type=1400 audit(1712955782.130:1577): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.240764 kernel: audit: type=1300 audit(1712955782.130:1577): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008ee9260 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.240803 kernel: audit: type=1327 audit(1712955782.130:1577): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.338345 kernel: audit: type=1400 audit(1712955782.131:1578): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.338411 kernel: audit: type=1300 audit(1712955782.131:1578): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40066d1320 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40066d1320 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.449834 kernel: audit: type=1327 audit(1712955782.131:1578): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.449903 kernel: audit: type=1400 audit(1712955782.131:1579): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008ee92c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.560057 kernel: audit: type=1300 audit(1712955782.131:1579): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008ee92c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.560142 kernel: audit: type=1327 audit(1712955782.131:1579): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.665364 kernel: audit: type=1400 audit(1712955782.181:1580): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40069a0870 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40069a1cb0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=40066d1380 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:03:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:03:02.581000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.581000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400242d420 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:02.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:02.581000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:02.581000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d14b40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:02.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.065091 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:03:17.065248 kernel: audit: type=1400 audit(1712955797.052:1585): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001893160 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.167956 kernel: audit: type=1300 audit(1712955797.052:1585): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001893160 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.168036 kernel: audit: type=1327 audit(1712955797.052:1585): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.264956 kernel: audit: type=1400 audit(1712955797.052:1586): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.265020 kernel: audit: type=1300 audit(1712955797.052:1586): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40007514c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40007514c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.376044 kernel: audit: type=1327 audit(1712955797.052:1586): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.376098 kernel: audit: type=1400 audit(1712955797.052:1587): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=400263a2a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.478589 kernel: audit: type=1300 audit(1712955797.052:1587): arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=400263a2a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.478633 kernel: audit: type=1327 audit(1712955797.052:1587): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:17.052000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.575449 kernel: audit: type=1400 audit(1712955797.052:1588): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:03:17.052000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026ba000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:03:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:03:32.422552 systemd[1]: Starting systemd-tmpfiles-clean.service... Apr 12 21:03:32.432089 systemd-tmpfiles[10459]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 21:03:32.432415 systemd-tmpfiles[10459]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 21:03:32.433303 systemd-tmpfiles[10459]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 21:03:32.455121 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Apr 12 21:03:32.455313 systemd[1]: Finished systemd-tmpfiles-clean.service. Apr 12 21:03:32.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:03:32.466741 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:03:32.466932 kernel: audit: type=1130 audit(1712955812.453:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:03:32.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:03:32.509743 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Apr 12 21:03:32.548636 kernel: audit: type=1131 audit(1712955812.453:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:03:55.868000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:03:55.868000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6f00 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:03:55.979195 kernel: audit: type=1400 audit(1712955835.868:1591): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:03:55.979362 kernel: audit: type=1300 audit(1712955835.868:1591): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6f00 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:03:55.979469 kernel: audit: type=1327 audit(1712955835.868:1591): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:03:55.868000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:03:55.934000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:03:56.087107 kernel: audit: type=1400 audit(1712955835.934:1592): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:03:56.087167 kernel: audit: type=1300 audit(1712955835.934:1592): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ffada0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:03:55.934000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ffada0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:03:55.934000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:03:56.196514 kernel: audit: type=1327 audit(1712955835.934:1592): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:04:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400868de60 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.241583 kernel: audit: type=1400 audit(1712955842.131:1593): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.241725 kernel: audit: type=1300 audit(1712955842.131:1593): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400868de60 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.241766 kernel: audit: type=1327 audit(1712955842.131:1593): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.346727 kernel: audit: type=1400 audit(1712955842.132:1594): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.346774 kernel: audit: type=1300 audit(1712955842.132:1594): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40084cde00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40084cde00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.458310 kernel: audit: type=1327 audit(1712955842.132:1594): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.458390 kernel: audit: type=1400 audit(1712955842.132:1595): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4014bfbce0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.561431 kernel: audit: type=1300 audit(1712955842.132:1595): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4014bfbce0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.561498 kernel: audit: type=1327 audit(1712955842.132:1595): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.666679 kernel: audit: type=1400 audit(1712955842.181:1597): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40090aa390 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400868df20 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4009e6bda0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:04:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:04:02.581000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.581000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400263b3e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:02.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:02.581000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:02.581000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400239a390 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:02.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.053000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.066040 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:04:17.066267 kernel: audit: type=1400 audit(1712955857.053:1601): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.053000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ee2c60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.168807 kernel: audit: type=1300 audit(1712955857.053:1601): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ee2c60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.168866 kernel: audit: type=1327 audit(1712955857.053:1601): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.053000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.265766 kernel: audit: type=1400 audit(1712955857.053:1602): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.265830 kernel: audit: type=1300 audit(1712955857.053:1602): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400263bae0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.053000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400263bae0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.053000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.368221 kernel: audit: type=1400 audit(1712955857.053:1603): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.368290 kernel: audit: type=1327 audit(1712955857.053:1602): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.053000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40021a8840 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.479312 kernel: audit: type=1300 audit(1712955857.053:1603): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40021a8840 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.532009 kernel: audit: type=1327 audit(1712955857.053:1603): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:17.532043 kernel: audit: type=1400 audit(1712955857.053:1604): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.053000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:04:17.053000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee2ca0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:04:17.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:04:55.868000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:04:55.880688 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:04:55.880895 kernel: audit: type=1400 audit(1712955895.868:1605): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:04:55.868000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a0940 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:04:55.991442 kernel: audit: type=1300 audit(1712955895.868:1605): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a0940 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:04:55.991516 kernel: audit: type=1327 audit(1712955895.868:1605): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:04:55.868000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:04:55.935000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:04:56.099167 kernel: audit: type=1400 audit(1712955895.935:1606): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:04:56.099246 kernel: audit: type=1300 audit(1712955895.935:1606): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e427e0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:04:55.935000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e427e0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:04:55.935000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:04:56.208724 kernel: audit: type=1327 audit(1712955895.935:1606): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:05:02.130000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.130000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400957e750 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.242033 kernel: audit: type=1400 audit(1712955902.130:1607): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.242077 kernel: audit: type=1300 audit(1712955902.130:1607): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400957e750 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.242120 kernel: audit: type=1327 audit(1712955902.130:1607): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.346922 kernel: audit: type=1400 audit(1712955902.131:1608): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.346967 kernel: audit: type=1300 audit(1712955902.131:1608): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400957e7b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400957e7b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.458386 kernel: audit: type=1327 audit(1712955902.131:1608): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.458437 kernel: audit: type=1400 audit(1712955902.131:1609): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008c03c40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.561453 kernel: audit: type=1300 audit(1712955902.131:1609): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008c03c40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.561545 kernel: audit: type=1327 audit(1712955902.131:1609): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.665910 kernel: audit: type=1400 audit(1712955902.181:1610): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40085244e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400761e060 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.181000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.181000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4004c582a0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:05:02.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:05:02.580000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.580000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:02.580000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f2caa0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:02.580000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001e96840 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:02.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:02.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:05.316865 kubelet[3480]: W0412 21:05:05.316835 3480 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 21:05:17.054000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.067200 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:05:17.067363 kernel: audit: type=1400 audit(1712955917.054:1615): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.054000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001892c60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.170064 kernel: audit: type=1300 audit(1712955917.054:1615): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001892c60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.170136 kernel: audit: type=1327 audit(1712955917.054:1615): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:17.054000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.267123 kernel: audit: type=1400 audit(1712955917.054:1616): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.267180 kernel: audit: type=1300 audit(1712955917.054:1616): arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=4001892c80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.054000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=4001892c80 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:17.378165 kernel: audit: type=1327 audit(1712955917.054:1616): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:17.378238 kernel: audit: type=1400 audit(1712955917.054:1617): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.054000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.054000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.466648 kernel: audit: type=1400 audit(1712955917.054:1618): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:05:17.466699 kernel: audit: type=1300 audit(1712955917.054:1617): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c37c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.054000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c37c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:17.577717 kernel: audit: type=1327 audit(1712955917.054:1617): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:17.054000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001f2cec0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:05:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:05:55.868000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:05:55.881525 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:05:55.881724 kernel: audit: type=1400 audit(1712955955.868:1619): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:05:55.868000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6680 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:05:55.991726 kernel: audit: type=1300 audit(1712955955.868:1619): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6680 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:05:55.991775 kernel: audit: type=1327 audit(1712955955.868:1619): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:05:55.868000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:05:55.934000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:05:56.098861 kernel: audit: type=1400 audit(1712955955.934:1620): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:05:56.098898 kernel: audit: type=1300 audit(1712955955.934:1620): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2060 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:05:55.934000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2060 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:05:55.934000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:05:56.207779 kernel: audit: type=1327 audit(1712955955.934:1620): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:06:02.131000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.131000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dad1620 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.242094 kernel: audit: type=1400 audit(1712955962.131:1621): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.242253 kernel: audit: type=1300 audit(1712955962.131:1621): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dad1620 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.242307 kernel: audit: type=1327 audit(1712955962.131:1621): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.346825 kernel: audit: type=1400 audit(1712955962.132:1622): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.346871 kernel: audit: type=1300 audit(1712955962.132:1622): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400d9fa900 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400d9fa900 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.458411 kernel: audit: type=1327 audit(1712955962.132:1622): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.458473 kernel: audit: type=1400 audit(1712955962.132:1623): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005b4cbc0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.561593 kernel: audit: type=1300 audit(1712955962.132:1623): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005b4cbc0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.561663 kernel: audit: type=1327 audit(1712955962.132:1623): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.659522 kernel: audit: type=1400 audit(1712955962.182:1624): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005b4cbe0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400d9fa990 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dad16e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:06:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:06:02.581000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.581000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:02.581000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002630db0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:02.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:02.581000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242c260 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:02.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.055000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.068401 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:06:17.068568 kernel: audit: type=1400 audit(1712955977.055:1629): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.055000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb7580 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.171898 kernel: audit: type=1300 audit(1712955977.055:1629): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb7580 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.171937 kernel: audit: type=1327 audit(1712955977.055:1629): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.055000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.269601 kernel: audit: type=1400 audit(1712955977.055:1630): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.269696 kernel: audit: type=1300 audit(1712955977.055:1630): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242cec0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.055000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242cec0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.055000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.372753 kernel: audit: type=1400 audit(1712955977.055:1631): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.372784 kernel: audit: type=1327 audit(1712955977.055:1630): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.055000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001d29640 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.484454 kernel: audit: type=1300 audit(1712955977.055:1631): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001d29640 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.484522 kernel: audit: type=1400 audit(1712955977.055:1632): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.055000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:06:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.581927 kernel: audit: type=1327 audit(1712955977.055:1631): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:17.055000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=400125a2e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:06:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:06:55.869000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:06:55.882077 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:06:55.882259 kernel: audit: type=1400 audit(1712956015.869:1633): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:06:55.869000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c280 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:06:55.992330 kernel: audit: type=1300 audit(1712956015.869:1633): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c280 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:06:55.992373 kernel: audit: type=1327 audit(1712956015.869:1633): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:06:55.869000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:06:55.934000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:06:56.099513 kernel: audit: type=1400 audit(1712956015.934:1634): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:06:56.099556 kernel: audit: type=1300 audit(1712956015.934:1634): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc0a20 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:06:55.934000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc0a20 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:06:55.934000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:06:56.208536 kernel: audit: type=1327 audit(1712956015.934:1634): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:07:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006a22ff0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.243134 kernel: audit: type=1400 audit(1712956022.132:1635): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.243307 kernel: audit: type=1300 audit(1712956022.132:1635): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006a22ff0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.243377 kernel: audit: type=1327 audit(1712956022.132:1635): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.347772 kernel: audit: type=1400 audit(1712956022.132:1636): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.347827 kernel: audit: type=1300 audit(1712956022.132:1636): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4006906a50 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4006906a50 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.459225 kernel: audit: type=1327 audit(1712956022.132:1636): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.459486 kernel: audit: type=1400 audit(1712956022.132:1637): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.132000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.132000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=40133873c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.562425 kernel: audit: type=1300 audit(1712956022.132:1637): arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=40133873c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.562504 kernel: audit: type=1327 audit(1712956022.132:1637): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.666993 kernel: audit: type=1400 audit(1712956022.182:1638): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4009a59710 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4009a59740 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40133873e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:07:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:07:02.582000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.582000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002514620 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:02.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:02.582000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:02.582000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400239ba40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:02.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.056000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.068796 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:07:17.068981 kernel: audit: type=1400 audit(1712956037.056:1643): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.056000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400125a640 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.171674 kernel: audit: type=1300 audit(1712956037.056:1643): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400125a640 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.171761 kernel: audit: type=1327 audit(1712956037.056:1643): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.056000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.268699 kernel: audit: type=1400 audit(1712956037.056:1644): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.268800 kernel: audit: type=1400 audit(1712956037.056:1645): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.056000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.056000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f2d5a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.371286 kernel: audit: type=1300 audit(1712956037.056:1644): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f2d5a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.371374 kernel: audit: type=1327 audit(1712956037.056:1644): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.056000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400242ca60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.482336 kernel: audit: type=1300 audit(1712956037.056:1645): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400242ca60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.535021 kernel: audit: type=1327 audit(1712956037.056:1645): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:17.535069 kernel: audit: type=1400 audit(1712956037.057:1646): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:07:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d28220 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:07:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:07:55.869000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:07:55.882683 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:07:55.882871 kernel: audit: type=1400 audit(1712956075.869:1647): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:07:55.869000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c140 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:07:55.993360 kernel: audit: type=1300 audit(1712956075.869:1647): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c140 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:07:55.993427 kernel: audit: type=1327 audit(1712956075.869:1647): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:07:55.869000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:07:55.935000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:07:56.101064 kernel: audit: type=1400 audit(1712956075.935:1648): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:07:56.101143 kernel: audit: type=1300 audit(1712956075.935:1648): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc0080 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:07:55.935000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc0080 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:07:55.935000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:07:56.210546 kernel: audit: type=1327 audit(1712956075.935:1648): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:08:02.133000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.133000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40076917a0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.237599 kernel: audit: type=1400 audit(1712956082.133:1649): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.237652 kernel: audit: type=1300 audit(1712956082.133:1649): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40076917a0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.237711 kernel: audit: type=1327 audit(1712956082.133:1649): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.133000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.133000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.342705 kernel: audit: type=1400 audit(1712956082.133:1650): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.342781 kernel: audit: type=1300 audit(1712956082.133:1650): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4015498b40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.133000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4015498b40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.133000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.454151 kernel: audit: type=1327 audit(1712956082.133:1650): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.454231 kernel: audit: type=1400 audit(1712956082.133:1651): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.133000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.133000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400868d6b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.564440 kernel: audit: type=1300 audit(1712956082.133:1651): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400868d6b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.564566 kernel: audit: type=1327 audit(1712956082.133:1651): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.133000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.669751 kernel: audit: type=1400 audit(1712956082.182:1652): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40054003f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4010c88060 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.182000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.182000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4015418cc0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:08:02.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:08:02.582000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.582000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022ab5f0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:02.582000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:02.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:02.582000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee30a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:02.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.068949 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:08:17.069121 kernel: audit: type=1400 audit(1712956097.057:1657): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a9600 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.171860 kernel: audit: type=1300 audit(1712956097.057:1657): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021a9600 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.171935 kernel: audit: type=1327 audit(1712956097.057:1657): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.269015 kernel: audit: type=1400 audit(1712956097.057:1658): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.269064 kernel: audit: type=1300 audit(1712956097.057:1658): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400174d2e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400174d2e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.380125 kernel: audit: type=1327 audit(1712956097.057:1658): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.380154 kernel: audit: type=1400 audit(1712956097.057:1659): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001097700 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.482751 kernel: audit: type=1300 audit(1712956097.057:1659): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001097700 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.482807 kernel: audit: type=1327 audit(1712956097.057:1659): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.579719 kernel: audit: type=1400 audit(1712956097.057:1660): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:08:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001097740 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:08:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:08:47.642215 systemd[1]: Started sshd@10-147.28.150.175:22-218.92.0.47:34982.service. Apr 12 21:08:47.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.150.175:22-218.92.0.47:34982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:08:47.653990 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:08:47.654185 kernel: audit: type=1130 audit(1712956127.640:1661): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.150.175:22-218.92.0.47:34982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:08:49.404873 sshd[11685]: Unable to negotiate with 218.92.0.47 port 34982: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Apr 12 21:08:49.405820 systemd[1]: sshd@10-147.28.150.175:22-218.92.0.47:34982.service: Deactivated successfully. Apr 12 21:08:49.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.150.175:22-218.92.0.47:34982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:08:49.449466 kernel: audit: type=1131 audit(1712956129.404:1662): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.150.175:22-218.92.0.47:34982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:08:55.870000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:08:55.870000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a1fc0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:08:55.983102 kernel: audit: type=1400 audit(1712956135.870:1663): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:08:55.983301 kernel: audit: type=1300 audit(1712956135.870:1663): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a1fc0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:08:55.983387 kernel: audit: type=1327 audit(1712956135.870:1663): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:08:55.870000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:08:55.935000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:08:56.091120 kernel: audit: type=1400 audit(1712956135.935:1664): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:08:56.091162 kernel: audit: type=1300 audit(1712956135.935:1664): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f2e1a0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:08:55.935000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f2e1a0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:08:55.935000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:08:56.200596 kernel: audit: type=1327 audit(1712956135.935:1664): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:09:02.135000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.135000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401273a9c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.245586 kernel: audit: type=1400 audit(1712956142.135:1665): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.245766 kernel: audit: type=1300 audit(1712956142.135:1665): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401273a9c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.245816 kernel: audit: type=1327 audit(1712956142.135:1665): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.135000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.350471 kernel: audit: type=1400 audit(1712956142.135:1666): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.350516 kernel: audit: type=1300 audit(1712956142.135:1666): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400fec5860 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.135000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400fec5860 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.462271 kernel: audit: type=1327 audit(1712956142.135:1666): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.462339 kernel: audit: type=1400 audit(1712956142.135:1667): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.135000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.135000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=40066d0d40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.565370 kernel: audit: type=1300 audit(1712956142.135:1667): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=40066d0d40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.565452 kernel: audit: type=1327 audit(1712956142.135:1667): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.184000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.663189 kernel: audit: type=1400 audit(1712956142.184:1668): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.184000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006022240 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.184000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.184000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4004dc6120 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.184000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.184000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=401273ad20 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:09:02.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:09:02.584000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.584000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001039c40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:02.584000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:02.584000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:02.584000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001e96930 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:02.584000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.069900 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:09:17.070067 kernel: audit: type=1400 audit(1712956157.057:1673): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400263b1e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.173268 kernel: audit: type=1300 audit(1712956157.057:1673): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400263b1e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.173332 kernel: audit: type=1327 audit(1712956157.057:1673): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.270814 kernel: audit: type=1400 audit(1712956157.057:1674): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.270881 kernel: audit: type=1300 audit(1712956157.057:1674): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400174cbe0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400174cbe0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.382452 kernel: audit: type=1327 audit(1712956157.057:1674): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.382527 kernel: audit: type=1400 audit(1712956157.057:1675): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.057000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.057000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=4000ca6a40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.485537 kernel: audit: type=1300 audit(1712956157.057:1675): arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=4000ca6a40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.538500 kernel: audit: type=1327 audit(1712956157.057:1675): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:17.538564 kernel: audit: type=1400 audit(1712956157.058:1676): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:09:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40024a8000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:09:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:09:21.249319 systemd[1]: Started sshd@11-147.28.150.175:22-167.94.145.53:48136.service. Apr 12 21:09:21.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.150.175:22-167.94.145.53:48136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:09:36.246657 sshd[11847]: Connection closed by 167.94.145.53 port 48136 [preauth] Apr 12 21:09:36.248014 systemd[1]: sshd@11-147.28.150.175:22-167.94.145.53:48136.service: Deactivated successfully. Apr 12 21:09:36.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.150.175:22-167.94.145.53:48136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:09:36.259720 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 21:09:36.259897 kernel: audit: type=1131 audit(1712956176.246:1678): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.150.175:22-167.94.145.53:48136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:09:55.872000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:09:55.872000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001080880 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:09:55.984194 kernel: audit: type=1400 audit(1712956195.872:1679): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:09:55.984322 kernel: audit: type=1300 audit(1712956195.872:1679): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001080880 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:09:55.984365 kernel: audit: type=1327 audit(1712956195.872:1679): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:09:55.872000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:09:55.937000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:09:56.092329 kernel: audit: type=1400 audit(1712956195.937:1680): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:09:56.092372 kernel: audit: type=1300 audit(1712956195.937:1680): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e420e0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:09:55.937000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e420e0 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:09:55.937000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:09:56.201796 kernel: audit: type=1327 audit(1712956195.937:1680): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:10:02.135000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.135000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.232585 kernel: audit: type=1400 audit(1712956202.135:1681): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.232697 kernel: audit: type=1400 audit(1712956202.135:1682): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.232751 kernel: audit: type=1300 audit(1712956202.135:1681): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40065d9b80 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.135000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40065d9b80 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.343911 kernel: audit: type=1327 audit(1712956202.135:1681): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.135000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40123b7da0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.402058 kernel: audit: type=1300 audit(1712956202.135:1682): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40123b7da0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.402105 kernel: audit: type=1327 audit(1712956202.135:1682): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.135000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.507462 kernel: audit: type=1400 audit(1712956202.135:1683): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.507570 kernel: audit: type=1300 audit(1712956202.135:1683): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4010e0a180 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.135000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4010e0a180 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.135000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.618972 kernel: audit: type=1327 audit(1712956202.135:1683): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.619058 kernel: audit: type=1400 audit(1712956202.185:1684): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.185000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.185000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.185000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400d91f5c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.185000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40065d9fa0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.185000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.185000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.185000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.185000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=400689a420 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:10:02.185000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:10:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400269c8a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee23a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:05.316191 kubelet[3480]: W0412 21:10:05.316166 3480 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 21:10:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.070074 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:10:17.070266 kernel: audit: type=1400 audit(1712956217.058:1689): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022cb180 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.173544 kernel: audit: type=1300 audit(1712956217.058:1689): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022cb180 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.173610 kernel: audit: type=1327 audit(1712956217.058:1689): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.271230 kernel: audit: type=1400 audit(1712956217.058:1690): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.271278 kernel: audit: type=1300 audit(1712956217.058:1690): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002515f20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002515f20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:17.382899 kernel: audit: type=1327 audit(1712956217.058:1690): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:17.382938 kernel: audit: type=1400 audit(1712956217.058:1691): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40024a90a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.485976 kernel: audit: type=1300 audit(1712956217.058:1691): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40024a90a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:17.538908 kernel: audit: type=1327 audit(1712956217.058:1691): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:17.538937 kernel: audit: type=1400 audit(1712956217.058:1692): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:10:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001892000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:10:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:10:55.873000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:10:55.885089 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:10:55.885281 kernel: audit: type=1400 audit(1712956255.873:1693): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:10:55.873000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003dc580 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:10:55.995667 kernel: audit: type=1300 audit(1712956255.873:1693): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003dc580 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:10:55.995753 kernel: audit: type=1327 audit(1712956255.873:1693): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:10:55.873000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:10:55.938000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:10:56.103490 kernel: audit: type=1400 audit(1712956255.938:1694): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:10:56.103584 kernel: audit: type=1300 audit(1712956255.938:1694): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d50500 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:10:55.938000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d50500 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:10:55.938000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:10:56.212806 kernel: audit: type=1327 audit(1712956255.938:1694): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:11:02.136000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.136000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40084c3e30 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.246857 kernel: audit: type=1400 audit(1712956262.136:1695): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.246902 kernel: audit: type=1300 audit(1712956262.136:1695): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40084c3e30 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.246924 kernel: audit: type=1327 audit(1712956262.136:1695): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.136000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.351631 kernel: audit: type=1400 audit(1712956262.136:1696): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.351690 kernel: audit: type=1300 audit(1712956262.136:1696): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4011189620 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.136000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4011189620 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.463001 kernel: audit: type=1327 audit(1712956262.136:1696): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.463040 kernel: audit: type=1400 audit(1712956262.136:1697): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.136000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.136000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400b106d00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.566004 kernel: audit: type=1300 audit(1712956262.136:1697): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=400b106d00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.566068 kernel: audit: type=1327 audit(1712956262.136:1697): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.670409 kernel: audit: type=1400 audit(1712956262.186:1699): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4008319a10 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400b106ea0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4010e97770 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:11:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:11:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400240a180 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022cb440 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.071023 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:11:17.071214 kernel: audit: type=1400 audit(1712956277.058:1703): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca66a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.173822 kernel: audit: type=1300 audit(1712956277.058:1703): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ca66a0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.173886 kernel: audit: type=1327 audit(1712956277.058:1703): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.270791 kernel: audit: type=1400 audit(1712956277.058:1704): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.270835 kernel: audit: type=1300 audit(1712956277.058:1704): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400174cf20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400174cf20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.381794 kernel: audit: type=1327 audit(1712956277.058:1704): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.381836 kernel: audit: type=1400 audit(1712956277.058:1705): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=40022cb960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.484312 kernel: audit: type=1300 audit(1712956277.058:1705): arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=40022cb960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.484358 kernel: audit: type=1327 audit(1712956277.058:1705): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.581202 kernel: audit: type=1400 audit(1712956277.058:1706): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:11:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001096660 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:11:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:11:55.874000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:11:55.885986 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:11:55.886136 kernel: audit: type=1400 audit(1712956315.874:1707): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:11:55.874000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139d5e0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:11:55.996595 kernel: audit: type=1300 audit(1712956315.874:1707): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139d5e0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:11:55.996662 kernel: audit: type=1327 audit(1712956315.874:1707): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:11:55.874000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:11:55.938000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:11:56.104507 kernel: audit: type=1400 audit(1712956315.938:1708): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:11:56.104608 kernel: audit: type=1300 audit(1712956315.938:1708): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2260 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:11:55.938000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40015b2260 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:11:55.938000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:11:56.213999 kernel: audit: type=1327 audit(1712956315.938:1708): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:12:02.137000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.137000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008ef0360 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.240554 kernel: audit: type=1400 audit(1712956322.137:1709): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.240722 kernel: audit: type=1300 audit(1712956322.137:1709): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008ef0360 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.240906 kernel: audit: type=1327 audit(1712956322.137:1709): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.137000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.345354 kernel: audit: type=1400 audit(1712956322.137:1710): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.345433 kernel: audit: type=1300 audit(1712956322.137:1710): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008d35bc0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.137000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008d35bc0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.456843 kernel: audit: type=1327 audit(1712956322.137:1710): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.456957 kernel: audit: type=1400 audit(1712956322.137:1711): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.137000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.137000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=40060fdce0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.567136 kernel: audit: type=1300 audit(1712956322.137:1711): arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=40060fdce0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.567273 kernel: audit: type=1327 audit(1712956322.137:1711): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.671637 kernel: audit: type=1400 audit(1712956322.186:1712): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40060fdda0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401120b110 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4009ad2d20 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:12:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:12:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001096ce0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001e97a10 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.071444 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:12:17.071632 kernel: audit: type=1400 audit(1712956337.058:1717): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400242d9c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.174405 kernel: audit: type=1300 audit(1712956337.058:1717): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400242d9c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.174540 kernel: audit: type=1327 audit(1712956337.058:1717): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.271718 kernel: audit: type=1400 audit(1712956337.058:1718): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.271805 kernel: audit: type=1300 audit(1712956337.058:1718): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c2580 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014c2580 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.382889 kernel: audit: type=1327 audit(1712956337.058:1718): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.382978 kernel: audit: type=1400 audit(1712956337.058:1719): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=400125b4c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.485523 kernel: audit: type=1300 audit(1712956337.058:1719): arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=400125b4c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.485597 kernel: audit: type=1327 audit(1712956337.058:1719): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:17.058000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.582493 kernel: audit: type=1400 audit(1712956337.058:1720): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:12:17.058000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400242d9e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:12:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:12:55.875000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:12:55.887038 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:12:55.887197 kernel: audit: type=1400 audit(1712956375.875:1721): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:12:55.875000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a0560 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:12:55.997786 kernel: audit: type=1300 audit(1712956375.875:1721): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a0560 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:12:55.997836 kernel: audit: type=1327 audit(1712956375.875:1721): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:12:55.875000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:12:55.939000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:12:56.105788 kernel: audit: type=1400 audit(1712956375.939:1722): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:12:56.105861 kernel: audit: type=1300 audit(1712956375.939:1722): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e42820 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:12:55.939000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e42820 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:12:55.939000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:12:56.215217 kernel: audit: type=1327 audit(1712956375.939:1722): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:13:02.136000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.136000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008d29260 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.248024 kernel: audit: type=1400 audit(1712956382.136:1723): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.248179 kernel: audit: type=1300 audit(1712956382.136:1723): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008d29260 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.248244 kernel: audit: type=1327 audit(1712956382.136:1723): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.136000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.345790 kernel: audit: type=1400 audit(1712956382.136:1724): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.345840 kernel: audit: type=1300 audit(1712956382.136:1724): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008c020c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.136000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008c020c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.457267 kernel: audit: type=1327 audit(1712956382.136:1724): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.457343 kernel: audit: type=1400 audit(1712956382.136:1725): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.136000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.136000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008d292c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.567593 kernel: audit: type=1300 audit(1712956382.136:1725): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008d292c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.567652 kernel: audit: type=1327 audit(1712956382.136:1725): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.673154 kernel: audit: type=1400 audit(1712956382.186:1726): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40072a3320 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008d29350 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.186000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.186000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4006fc9320 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:13:02.186000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:13:02.584000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.584000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d29220 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:02.584000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:02.585000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:02.585000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001b8ea50 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:02.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.072166 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:13:17.072357 kernel: audit: type=1400 audit(1712956397.059:1731): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.160878 kernel: audit: type=1400 audit(1712956397.059:1732): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.160919 kernel: audit: type=1300 audit(1712956397.059:1731): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f2c8c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f2c8c0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.272157 kernel: audit: type=1327 audit(1712956397.059:1731): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.272233 kernel: audit: type=1300 audit(1712956397.059:1732): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a8c60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a8c60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.383414 kernel: audit: type=1327 audit(1712956397.059:1732): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.383452 kernel: audit: type=1400 audit(1712956397.059:1733): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40014c3540 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.486080 kernel: audit: type=1300 audit(1712956397.059:1733): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40014c3540 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.486151 kernel: audit: type=1327 audit(1712956397.059:1733): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.583076 kernel: audit: type=1400 audit(1712956397.059:1734): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:13:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001f2c940 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:13:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:13:55.874000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:13:55.887698 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:13:55.887881 kernel: audit: type=1400 audit(1712956435.874:1735): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:13:55.874000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001081060 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:13:55.998469 kernel: audit: type=1300 audit(1712956435.874:1735): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001081060 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:13:55.998531 kernel: audit: type=1327 audit(1712956435.874:1735): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:13:55.874000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:13:55.939000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:13:56.106577 kernel: audit: type=1400 audit(1712956435.939:1736): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:13:56.106650 kernel: audit: type=1300 audit(1712956435.939:1736): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d50080 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:13:55.939000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d50080 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:13:55.939000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:13:56.216127 kernel: audit: type=1327 audit(1712956435.939:1736): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:14:02.137000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.137000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40124b2760 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.241529 kernel: audit: type=1400 audit(1712956442.137:1737): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.241576 kernel: audit: type=1300 audit(1712956442.137:1737): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40124b2760 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.241640 kernel: audit: type=1327 audit(1712956442.137:1737): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.137000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.346436 kernel: audit: type=1400 audit(1712956442.137:1738): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.346553 kernel: audit: type=1300 audit(1712956442.137:1738): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4009c5cae0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.137000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4009c5cae0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.457936 kernel: audit: type=1327 audit(1712956442.137:1738): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.457971 kernel: audit: type=1400 audit(1712956442.137:1739): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.137000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.137000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008ada5d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.568150 kernel: audit: type=1300 audit(1712956442.137:1739): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4008ada5d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.568236 kernel: audit: type=1327 audit(1712956442.137:1739): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.187000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.672610 kernel: audit: type=1400 audit(1712956442.187:1740): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.187000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4009c5ced0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.187000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.187000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4005d14480 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.187000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.187000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40104114d0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:14:02.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:14:02.586000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.586000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400099bda0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:02.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:02.586000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:02.586000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001d95800 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:02.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.072675 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:14:17.072864 kernel: audit: type=1400 audit(1712956457.059:1745): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.161358 kernel: audit: type=1400 audit(1712956457.059:1746): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.161387 kernel: audit: type=1300 audit(1712956457.059:1745): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010394e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010394e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.272606 kernel: audit: type=1327 audit(1712956457.059:1745): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.272664 kernel: audit: type=1300 audit(1712956457.059:1746): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021a9fc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021a9fc0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.383733 kernel: audit: type=1327 audit(1712956457.059:1746): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.383838 kernel: audit: type=1400 audit(1712956457.059:1747): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001039520 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.486323 kernel: audit: type=1300 audit(1712956457.059:1747): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001039520 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.486373 kernel: audit: type=1327 audit(1712956457.059:1747): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:17.059000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.583204 kernel: audit: type=1400 audit(1712956457.059:1748): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:14:17.059000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ca7880 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:14:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:14:55.875000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:14:55.888419 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:14:55.888610 kernel: audit: type=1400 audit(1712956495.875:1749): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:14:55.875000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6620 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:14:55.999084 kernel: audit: type=1300 audit(1712956495.875:1749): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b6620 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:14:55.999131 kernel: audit: type=1327 audit(1712956495.875:1749): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:14:55.875000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:14:55.939000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:14:56.107081 kernel: audit: type=1400 audit(1712956495.939:1750): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:14:56.107126 kernel: audit: type=1300 audit(1712956495.939:1750): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc0c60 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:14:55.939000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000dc0c60 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:14:55.939000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:14:56.216518 kernel: audit: type=1327 audit(1712956495.939:1750): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:15:02.138000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.138000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401129ffb0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.248863 kernel: audit: type=1400 audit(1712956502.138:1751): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.249063 kernel: audit: type=1300 audit(1712956502.138:1751): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401129ffb0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.249111 kernel: audit: type=1327 audit(1712956502.138:1751): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.138000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.353837 kernel: audit: type=1400 audit(1712956502.138:1752): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.353907 kernel: audit: type=1300 audit(1712956502.138:1752): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400950cea0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.138000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400950cea0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.465385 kernel: audit: type=1327 audit(1712956502.138:1752): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.465449 kernel: audit: type=1400 audit(1712956502.138:1753): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.138000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.138000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4008c8bce0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.568596 kernel: audit: type=1300 audit(1712956502.138:1753): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4008c8bce0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.568639 kernel: audit: type=1327 audit(1712956502.138:1753): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.187000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.673814 kernel: audit: type=1400 audit(1712956502.187:1754): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.187000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40081ffb00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.187000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.187000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4012cbc060 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.188000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.188000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4006bd3500 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:15:02.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:15:02.586000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.586000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f2d480 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:02.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:02.586000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:02.586000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ee6660 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:02.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:05.315808 kubelet[3480]: W0412 21:15:05.315777 3480 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 21:15:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.072897 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:15:17.073063 kernel: audit: type=1400 audit(1712956517.061:1759): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022cb5e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.175713 kernel: audit: type=1300 audit(1712956517.061:1759): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022cb5e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.175764 kernel: audit: type=1327 audit(1712956517.061:1759): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.272684 kernel: audit: type=1400 audit(1712956517.061:1760): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.272766 kernel: audit: type=1300 audit(1712956517.061:1760): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f2da20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f2da20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.375124 kernel: audit: type=1400 audit(1712956517.061:1761): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.375215 kernel: audit: type=1327 audit(1712956517.061:1760): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40014c35e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.486147 kernel: audit: type=1300 audit(1712956517.061:1761): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40014c35e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.486181 kernel: audit: type=1327 audit(1712956517.061:1761): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.583077 kernel: audit: type=1400 audit(1712956517.061:1762): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:15:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000fb6000 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:15:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:15:55.876000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:15:55.889403 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:15:55.889591 kernel: audit: type=1400 audit(1712956555.876:1763): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:15:55.876000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c0c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:15:56.000257 kernel: audit: type=1300 audit(1712956555.876:1763): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400139c0c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:15:55.876000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:15:56.053345 kernel: audit: type=1327 audit(1712956555.876:1763): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:15:56.053481 kernel: audit: type=1400 audit(1712956555.940:1764): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:15:55.940000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:15:55.940000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d50460 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:15:56.164824 kernel: audit: type=1300 audit(1712956555.940:1764): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d50460 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:15:56.164862 kernel: audit: type=1327 audit(1712956555.940:1764): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:15:55.940000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:16:02.139000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.139000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005d15280 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.242876 kernel: audit: type=1400 audit(1712956562.139:1765): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.243063 kernel: audit: type=1300 audit(1712956562.139:1765): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005d15280 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.243140 kernel: audit: type=1327 audit(1712956562.139:1765): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.139000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.347756 kernel: audit: type=1400 audit(1712956562.139:1766): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.347821 kernel: audit: type=1300 audit(1712956562.139:1766): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400375ec90 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.139000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400375ec90 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.459261 kernel: audit: type=1327 audit(1712956562.139:1766): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.139000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.511381 kernel: audit: type=1400 audit(1712956562.139:1767): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.511484 kernel: audit: type=1300 audit(1712956562.139:1767): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008930510 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.139000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008930510 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.622859 kernel: audit: type=1327 audit(1712956562.139:1767): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.622921 kernel: audit: type=1400 audit(1712956562.188:1768): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.188000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.188000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4005acc1c0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.188000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.188000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400375f380 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.188000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.188000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=400902adb0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:16:02.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:16:02.586000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.586000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400269c390 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:02.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:02.587000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:02.587000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400174d2e0 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:02.587000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.073476 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:16:17.073675 kernel: audit: type=1400 audit(1712956577.061:1773): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400099b880 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.176958 kernel: audit: type=1300 audit(1712956577.061:1773): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400099b880 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.176980 kernel: audit: type=1327 audit(1712956577.061:1773): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.274690 kernel: audit: type=1400 audit(1712956577.061:1774): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.274779 kernel: audit: type=1400 audit(1712956577.061:1775): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001893960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.377973 kernel: audit: type=1300 audit(1712956577.061:1774): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001893960 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.378063 kernel: audit: type=1327 audit(1712956577.061:1774): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400174dc60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.489733 kernel: audit: type=1300 audit(1712956577.061:1775): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400174dc60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.489767 kernel: audit: type=1327 audit(1712956577.061:1775): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.587263 kernel: audit: type=1400 audit(1712956577.061:1776): avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:16:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40022cb600 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:16:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:16:53.738420 systemd[1]: run-containerd-runc-k8s.io-3196acc0cdb29e6d25c398a6fd1ba264462d7d0f41c7976c21d0146e06f4cf5f-runc.NwRxYo.mount: Deactivated successfully. Apr 12 21:16:55.876000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:16:55.889774 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 21:16:55.889955 kernel: audit: type=1400 audit(1712956615.876:1777): avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:16:55.876000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b72c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:16:56.000608 kernel: audit: type=1300 audit(1712956615.876:1777): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008b72c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:16:56.000685 kernel: audit: type=1327 audit(1712956615.876:1777): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:16:55.876000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:16:55.941000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:16:56.108698 kernel: audit: type=1400 audit(1712956615.941:1778): avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:16:56.108789 kernel: audit: type=1300 audit(1712956615.941:1778): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ffa180 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:16:55.941000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ffa180 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:16:55.941000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:16:56.218260 kernel: audit: type=1327 audit(1712956615.941:1778): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:17:02.139000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.139000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400b1063e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.243041 kernel: audit: type=1400 audit(1712956622.139:1779): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.243135 kernel: audit: type=1300 audit(1712956622.139:1779): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400b1063e0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.243178 kernel: audit: type=1327 audit(1712956622.139:1779): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.139000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.347818 kernel: audit: type=1400 audit(1712956622.139:1780): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.347881 kernel: audit: type=1300 audit(1712956622.139:1780): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401129eed0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.139000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401129eed0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.459294 kernel: audit: type=1327 audit(1712956622.139:1780): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.459451 kernel: audit: type=1400 audit(1712956622.139:1781): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.139000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.139000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=4008b06270 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.569584 kernel: audit: type=1300 audit(1712956622.139:1781): arch=c00000b7 syscall=27 success=no exit=-13 a0=64 a1=4008b06270 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.569696 kernel: audit: type=1327 audit(1712956622.139:1781): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.190000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.667476 kernel: audit: type=1400 audit(1712956622.190:1782): avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.190000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400761eaa0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.190000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.190000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=401129ef00 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.190000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.190000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008b06630 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:17:02.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:17:02.588000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.588000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb6020 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:17:02.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:17:02.588000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:02.588000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400249b200 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:17:02.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:17:10.164440 systemd[1]: Started sshd@12-147.28.150.175:22-139.178.89.65:50136.service. Apr 12 21:17:10.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.150.175:22-139.178.89.65:50136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:10.176451 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 21:17:10.176702 kernel: audit: type=1130 audit(1712956630.164:1787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.150.175:22-139.178.89.65:50136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:10.629000 audit[13733]: USER_ACCT pid=13733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.630572 sshd[13733]: Accepted publickey for core from 139.178.89.65 port 50136 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:10.632570 sshd[13733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:10.637292 systemd-logind[2105]: New session 12 of user core. Apr 12 21:17:10.638575 systemd[1]: Started session-12.scope. Apr 12 21:17:10.631000 audit[13733]: CRED_ACQ pid=13733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.734394 kernel: audit: type=1101 audit(1712956630.629:1788): pid=13733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.734437 kernel: audit: type=1103 audit(1712956630.631:1789): pid=13733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.734482 kernel: audit: type=1006 audit(1712956630.631:1790): pid=13733 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 21:17:10.631000 audit[13733]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea209360 a2=3 a3=1 items=0 ppid=1 pid=13733 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.815650 kernel: audit: type=1300 audit(1712956630.631:1790): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea209360 a2=3 a3=1 items=0 ppid=1 pid=13733 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.815711 kernel: audit: type=1327 audit(1712956630.631:1790): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:10.631000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:10.640000 audit[13733]: USER_START pid=13733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.892899 kernel: audit: type=1105 audit(1712956630.640:1791): pid=13733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.892993 kernel: audit: type=1103 audit(1712956630.643:1792): pid=13735 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.643000 audit[13735]: CRED_ACQ pid=13735 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:11.036178 sshd[13733]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:11.036000 audit[13733]: USER_END pid=13733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:11.040629 systemd[1]: sshd@12-147.28.150.175:22-139.178.89.65:50136.service: Deactivated successfully. Apr 12 21:17:11.041833 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 21:17:11.042339 systemd-logind[2105]: Session 12 logged out. Waiting for processes to exit. Apr 12 21:17:11.042839 systemd-logind[2105]: Removed session 12. Apr 12 21:17:11.036000 audit[13733]: CRED_DISP pid=13733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:11.136786 kernel: audit: type=1106 audit(1712956631.036:1793): pid=13733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:11.136836 kernel: audit: type=1104 audit(1712956631.036:1794): pid=13733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:11.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.150.175:22-139.178.89.65:50136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:16.108732 systemd[1]: Started sshd@13-147.28.150.175:22-139.178.89.65:50152.service. Apr 12 21:17:16.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.150.175:22-139.178.89.65:50152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:16.120521 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:17:16.120678 kernel: audit: type=1130 audit(1712956636.108:1796): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.150.175:22-139.178.89.65:50152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:16.560000 audit[13793]: USER_ACCT pid=13793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.561055 sshd[13793]: Accepted publickey for core from 139.178.89.65 port 50152 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:16.563010 sshd[13793]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:16.567320 systemd-logind[2105]: New session 13 of user core. Apr 12 21:17:16.568553 systemd[1]: Started session-13.scope. Apr 12 21:17:16.562000 audit[13793]: CRED_ACQ pid=13793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.664670 kernel: audit: type=1101 audit(1712956636.560:1797): pid=13793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.664755 kernel: audit: type=1103 audit(1712956636.562:1798): pid=13793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.664820 kernel: audit: type=1006 audit(1712956636.562:1799): pid=13793 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 21:17:16.562000 audit[13793]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2d09810 a2=3 a3=1 items=0 ppid=1 pid=13793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:16.745758 kernel: audit: type=1300 audit(1712956636.562:1799): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2d09810 a2=3 a3=1 items=0 ppid=1 pid=13793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:16.745802 kernel: audit: type=1327 audit(1712956636.562:1799): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:16.562000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:16.570000 audit[13793]: USER_START pid=13793 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.822804 kernel: audit: type=1105 audit(1712956636.570:1800): pid=13793 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.822862 kernel: audit: type=1103 audit(1712956636.573:1801): pid=13795 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.573000 audit[13795]: CRED_ACQ pid=13795 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.945149 sshd[13793]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:16.945000 audit[13793]: USER_END pid=13793 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.949545 systemd[1]: sshd@13-147.28.150.175:22-139.178.89.65:50152.service: Deactivated successfully. Apr 12 21:17:16.950721 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 21:17:16.951199 systemd-logind[2105]: Session 13 logged out. Waiting for processes to exit. Apr 12 21:17:16.951694 systemd-logind[2105]: Removed session 13. Apr 12 21:17:16.945000 audit[13793]: CRED_DISP pid=13793 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:17.026589 systemd[1]: Started sshd@14-147.28.150.175:22-139.178.89.65:50162.service. Apr 12 21:17:17.045392 kernel: audit: type=1106 audit(1712956636.945:1802): pid=13793 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:17.045471 kernel: audit: type=1104 audit(1712956636.945:1803): pid=13793 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:16.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.150.175:22-139.178.89.65:50152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:17.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.150.175:22-139.178.89.65:50162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001097b20 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:17:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:17:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024a8e60 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:17:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:17:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001d29e40 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:17:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:17:17.061000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:17:17.061000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=d a1=4000ee3620 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:17:17.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:17:17.490000 audit[13811]: USER_ACCT pid=13811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:17.491397 sshd[13811]: Accepted publickey for core from 139.178.89.65 port 50162 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:17.491000 audit[13811]: CRED_ACQ pid=13811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:17.491000 audit[13811]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdde762d0 a2=3 a3=1 items=0 ppid=1 pid=13811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:17.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:17.492394 sshd[13811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:17.495139 systemd-logind[2105]: New session 14 of user core. Apr 12 21:17:17.496209 systemd[1]: Started session-14.scope. Apr 12 21:17:17.498000 audit[13811]: USER_START pid=13811 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:17.499000 audit[13815]: CRED_ACQ pid=13815 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:18.472234 sshd[13811]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:18.472000 audit[13811]: USER_END pid=13811 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:18.472000 audit[13811]: CRED_DISP pid=13811 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:18.474374 systemd[1]: sshd@14-147.28.150.175:22-139.178.89.65:50162.service: Deactivated successfully. Apr 12 21:17:18.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.150.175:22-139.178.89.65:50162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:18.475172 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 21:17:18.475426 systemd[1]: session-14.scope: Consumed 1.094s CPU time. Apr 12 21:17:18.475723 systemd-logind[2105]: Session 14 logged out. Waiting for processes to exit. Apr 12 21:17:18.476221 systemd-logind[2105]: Removed session 14. Apr 12 21:17:18.546093 systemd[1]: Started sshd@15-147.28.150.175:22-139.178.89.65:45250.service. Apr 12 21:17:18.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.150.175:22-139.178.89.65:45250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:19.002000 audit[13901]: USER_ACCT pid=13901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:19.003377 sshd[13901]: Accepted publickey for core from 139.178.89.65 port 45250 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:19.003000 audit[13901]: CRED_ACQ pid=13901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:19.003000 audit[13901]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbc7e120 a2=3 a3=1 items=0 ppid=1 pid=13901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:19.003000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:19.004373 sshd[13901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:19.007075 systemd-logind[2105]: New session 15 of user core. Apr 12 21:17:19.008126 systemd[1]: Started session-15.scope. Apr 12 21:17:19.010000 audit[13901]: USER_START pid=13901 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:19.011000 audit[13903]: CRED_ACQ pid=13903 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:19.387496 sshd[13901]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:19.387000 audit[13901]: USER_END pid=13901 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:19.387000 audit[13901]: CRED_DISP pid=13901 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:19.389581 systemd[1]: sshd@15-147.28.150.175:22-139.178.89.65:45250.service: Deactivated successfully. Apr 12 21:17:19.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.150.175:22-139.178.89.65:45250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:19.390381 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 21:17:19.390899 systemd-logind[2105]: Session 15 logged out. Waiting for processes to exit. Apr 12 21:17:19.391384 systemd-logind[2105]: Removed session 15. Apr 12 21:17:24.463625 systemd[1]: Started sshd@16-147.28.150.175:22-139.178.89.65:45254.service. Apr 12 21:17:24.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.150.175:22-139.178.89.65:45254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:24.475467 kernel: kauditd_printk_skb: 35 callbacks suppressed Apr 12 21:17:24.475695 kernel: audit: type=1130 audit(1712956644.462:1827): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.150.175:22-139.178.89.65:45254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:24.916000 audit[14025]: USER_ACCT pid=14025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:24.918032 sshd[14025]: Accepted publickey for core from 139.178.89.65 port 45254 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:24.919915 sshd[14025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:24.924191 systemd-logind[2105]: New session 16 of user core. Apr 12 21:17:24.925442 systemd[1]: Started session-16.scope. Apr 12 21:17:24.918000 audit[14025]: CRED_ACQ pid=14025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.021791 kernel: audit: type=1101 audit(1712956644.916:1828): pid=14025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.021825 kernel: audit: type=1103 audit(1712956644.918:1829): pid=14025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.021857 kernel: audit: type=1006 audit(1712956644.918:1830): pid=14025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 21:17:24.918000 audit[14025]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdf0df10 a2=3 a3=1 items=0 ppid=1 pid=14025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:25.103126 kernel: audit: type=1300 audit(1712956644.918:1830): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdf0df10 a2=3 a3=1 items=0 ppid=1 pid=14025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:25.103201 kernel: audit: type=1327 audit(1712956644.918:1830): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:24.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:24.969000 audit[14025]: USER_START pid=14025 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.180178 kernel: audit: type=1105 audit(1712956644.969:1831): pid=14025 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.180244 kernel: audit: type=1103 audit(1712956644.971:1832): pid=14027 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:24.971000 audit[14027]: CRED_ACQ pid=14027 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.305607 sshd[14025]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:25.304000 audit[14025]: USER_END pid=14025 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.309965 systemd[1]: sshd@16-147.28.150.175:22-139.178.89.65:45254.service: Deactivated successfully. Apr 12 21:17:25.311149 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 21:17:25.311643 systemd-logind[2105]: Session 16 logged out. Waiting for processes to exit. Apr 12 21:17:25.312133 systemd-logind[2105]: Removed session 16. Apr 12 21:17:25.304000 audit[14025]: CRED_DISP pid=14025 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.405762 kernel: audit: type=1106 audit(1712956645.304:1833): pid=14025 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.405797 kernel: audit: type=1104 audit(1712956645.304:1834): pid=14025 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:25.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.150.175:22-139.178.89.65:45254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:30.383261 systemd[1]: Started sshd@17-147.28.150.175:22-139.178.89.65:56018.service. Apr 12 21:17:30.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.150.175:22-139.178.89.65:56018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:30.395025 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:17:30.395219 kernel: audit: type=1130 audit(1712956650.381:1836): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.150.175:22-139.178.89.65:56018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:30.843000 audit[14060]: USER_ACCT pid=14060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:30.845185 sshd[14060]: Accepted publickey for core from 139.178.89.65 port 56018 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:30.847166 sshd[14060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:30.845000 audit[14060]: CRED_ACQ pid=14060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:30.948439 kernel: audit: type=1101 audit(1712956650.843:1837): pid=14060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:30.948492 kernel: audit: type=1103 audit(1712956650.845:1838): pid=14060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:30.951433 systemd-logind[2105]: New session 17 of user core. Apr 12 21:17:30.952724 systemd[1]: Started session-17.scope. Apr 12 21:17:30.977472 kernel: audit: type=1006 audit(1712956650.845:1839): pid=14060 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 21:17:30.977497 kernel: audit: type=1300 audit(1712956650.845:1839): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3eedd10 a2=3 a3=1 items=0 ppid=1 pid=14060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.845000 audit[14060]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3eedd10 a2=3 a3=1 items=0 ppid=1 pid=14060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:31.051636 kernel: audit: type=1327 audit(1712956650.845:1839): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:31.051699 kernel: audit: type=1105 audit(1712956650.953:1840): pid=14060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:30.953000 audit[14060]: USER_START pid=14060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:30.956000 audit[14062]: CRED_ACQ pid=14062 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:31.151121 kernel: audit: type=1103 audit(1712956650.956:1841): pid=14062 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:31.275112 sshd[14060]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:31.274000 audit[14060]: USER_END pid=14060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:31.279597 systemd[1]: sshd@17-147.28.150.175:22-139.178.89.65:56018.service: Deactivated successfully. Apr 12 21:17:31.280818 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 21:17:31.281319 systemd-logind[2105]: Session 17 logged out. Waiting for processes to exit. Apr 12 21:17:31.281808 systemd-logind[2105]: Removed session 17. Apr 12 21:17:31.274000 audit[14060]: CRED_DISP pid=14060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:31.375408 kernel: audit: type=1106 audit(1712956651.274:1842): pid=14060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:31.375438 kernel: audit: type=1104 audit(1712956651.274:1843): pid=14060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:31.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.150.175:22-139.178.89.65:56018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:36.352864 systemd[1]: Started sshd@18-147.28.150.175:22-139.178.89.65:56032.service. Apr 12 21:17:36.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.150.175:22-139.178.89.65:56032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:36.364627 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:17:36.364879 kernel: audit: type=1130 audit(1712956656.351:1845): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.150.175:22-139.178.89.65:56032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:36.815000 audit[14118]: USER_ACCT pid=14118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:36.817154 sshd[14118]: Accepted publickey for core from 139.178.89.65 port 56032 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:36.819103 sshd[14118]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:36.823413 systemd-logind[2105]: New session 18 of user core. Apr 12 21:17:36.824706 systemd[1]: Started session-18.scope. Apr 12 21:17:36.817000 audit[14118]: CRED_ACQ pid=14118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:36.920722 kernel: audit: type=1101 audit(1712956656.815:1846): pid=14118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:36.920766 kernel: audit: type=1103 audit(1712956656.817:1847): pid=14118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:36.920829 kernel: audit: type=1006 audit(1712956656.817:1848): pid=14118 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 21:17:36.817000 audit[14118]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3ae63c0 a2=3 a3=1 items=0 ppid=1 pid=14118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:37.001825 kernel: audit: type=1300 audit(1712956656.817:1848): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3ae63c0 a2=3 a3=1 items=0 ppid=1 pid=14118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:37.001850 kernel: audit: type=1327 audit(1712956656.817:1848): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:36.817000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:36.825000 audit[14118]: USER_START pid=14118 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.078873 kernel: audit: type=1105 audit(1712956656.825:1849): pid=14118 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.078930 kernel: audit: type=1103 audit(1712956656.828:1850): pid=14120 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:36.828000 audit[14120]: CRED_ACQ pid=14120 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.217625 sshd[14118]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:37.216000 audit[14118]: USER_END pid=14118 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.221998 systemd[1]: sshd@18-147.28.150.175:22-139.178.89.65:56032.service: Deactivated successfully. Apr 12 21:17:37.223096 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 21:17:37.223572 systemd-logind[2105]: Session 18 logged out. Waiting for processes to exit. Apr 12 21:17:37.224043 systemd-logind[2105]: Removed session 18. Apr 12 21:17:37.216000 audit[14118]: CRED_DISP pid=14118 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.317778 kernel: audit: type=1106 audit(1712956657.216:1851): pid=14118 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.317808 kernel: audit: type=1104 audit(1712956657.216:1852): pid=14118 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:37.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.150.175:22-139.178.89.65:56032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:42.294359 systemd[1]: Started sshd@19-147.28.150.175:22-139.178.89.65:37808.service. Apr 12 21:17:42.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.150.175:22-139.178.89.65:37808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:42.306123 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:17:42.306321 kernel: audit: type=1130 audit(1712956662.293:1854): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.150.175:22-139.178.89.65:37808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:42.756000 audit[14152]: USER_ACCT pid=14152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:42.758102 sshd[14152]: Accepted publickey for core from 139.178.89.65 port 37808 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:42.760061 sshd[14152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:42.764466 systemd-logind[2105]: New session 19 of user core. Apr 12 21:17:42.765710 systemd[1]: Started session-19.scope. Apr 12 21:17:42.758000 audit[14152]: CRED_ACQ pid=14152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:42.861865 kernel: audit: type=1101 audit(1712956662.756:1855): pid=14152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:42.861957 kernel: audit: type=1103 audit(1712956662.758:1856): pid=14152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:42.862015 kernel: audit: type=1006 audit(1712956662.758:1857): pid=14152 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 21:17:42.758000 audit[14152]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffaa252b0 a2=3 a3=1 items=0 ppid=1 pid=14152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:42.942976 kernel: audit: type=1300 audit(1712956662.758:1857): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffaa252b0 a2=3 a3=1 items=0 ppid=1 pid=14152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:42.758000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:42.964805 kernel: audit: type=1327 audit(1712956662.758:1857): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:42.964832 kernel: audit: type=1105 audit(1712956662.766:1858): pid=14152 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:42.766000 audit[14152]: USER_START pid=14152 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:42.769000 audit[14154]: CRED_ACQ pid=14154 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.065185 kernel: audit: type=1103 audit(1712956662.769:1859): pid=14154 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.152865 sshd[14152]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:43.152000 audit[14152]: USER_END pid=14152 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.157433 systemd[1]: sshd@19-147.28.150.175:22-139.178.89.65:37808.service: Deactivated successfully. Apr 12 21:17:43.158615 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 21:17:43.159109 systemd-logind[2105]: Session 19 logged out. Waiting for processes to exit. Apr 12 21:17:43.159631 systemd-logind[2105]: Removed session 19. Apr 12 21:17:43.152000 audit[14152]: CRED_DISP pid=14152 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.229000 systemd[1]: Started sshd@20-147.28.150.175:22-139.178.89.65:37818.service. Apr 12 21:17:43.253855 kernel: audit: type=1106 audit(1712956663.152:1860): pid=14152 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.253889 kernel: audit: type=1104 audit(1712956663.152:1861): pid=14152 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.150.175:22-139.178.89.65:37808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:43.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.28.150.175:22-139.178.89.65:37818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:43.673000 audit[14177]: USER_ACCT pid=14177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.675006 sshd[14177]: Accepted publickey for core from 139.178.89.65 port 37818 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:43.674000 audit[14177]: CRED_ACQ pid=14177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.674000 audit[14177]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff59379e0 a2=3 a3=1 items=0 ppid=1 pid=14177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:43.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:43.675968 sshd[14177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:43.678608 systemd-logind[2105]: New session 20 of user core. Apr 12 21:17:43.679704 systemd[1]: Started session-20.scope. Apr 12 21:17:43.680000 audit[14177]: USER_START pid=14177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:43.681000 audit[14179]: CRED_ACQ pid=14179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:44.158881 sshd[14177]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:44.157000 audit[14177]: USER_END pid=14177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:44.158000 audit[14177]: CRED_DISP pid=14177 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:44.160812 systemd[1]: sshd@20-147.28.150.175:22-139.178.89.65:37818.service: Deactivated successfully. Apr 12 21:17:44.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.28.150.175:22-139.178.89.65:37818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:44.161609 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 21:17:44.162072 systemd-logind[2105]: Session 20 logged out. Waiting for processes to exit. Apr 12 21:17:44.162555 systemd-logind[2105]: Removed session 20. Apr 12 21:17:44.238226 systemd[1]: Started sshd@21-147.28.150.175:22-139.178.89.65:37834.service. Apr 12 21:17:44.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.150.175:22-139.178.89.65:37834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:44.698000 audit[14206]: USER_ACCT pid=14206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:44.699910 sshd[14206]: Accepted publickey for core from 139.178.89.65 port 37834 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:44.699000 audit[14206]: CRED_ACQ pid=14206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:44.699000 audit[14206]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebed0020 a2=3 a3=1 items=0 ppid=1 pid=14206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:44.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:44.700886 sshd[14206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:44.703592 systemd-logind[2105]: New session 21 of user core. Apr 12 21:17:44.704672 systemd[1]: Started session-21.scope. Apr 12 21:17:44.705000 audit[14206]: USER_START pid=14206 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:44.706000 audit[14208]: CRED_ACQ pid=14208 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:45.385000 audit[14296]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=14296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.385000 audit[14296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe8098260 a2=0 a3=1 items=0 ppid=3947 pid=14296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.402000 audit[14296]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=14296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.402000 audit[14296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe8098260 a2=0 a3=1 items=0 ppid=3947 pid=14296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.422000 audit[14299]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=14299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.422000 audit[14299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffa0a77d0 a2=0 a3=1 items=0 ppid=3947 pid=14299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.432000 audit[14299]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=14299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.432000 audit[14299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffa0a77d0 a2=0 a3=1 items=0 ppid=3947 pid=14299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.469004 sshd[14206]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:45.468000 audit[14206]: USER_END pid=14206 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:45.468000 audit[14206]: CRED_DISP pid=14206 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:45.471148 systemd[1]: sshd@21-147.28.150.175:22-139.178.89.65:37834.service: Deactivated successfully. Apr 12 21:17:45.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.150.175:22-139.178.89.65:37834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:45.471945 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 21:17:45.472204 systemd[1]: session-21.scope: Consumed 2.911s CPU time. Apr 12 21:17:45.472499 systemd-logind[2105]: Session 21 logged out. Waiting for processes to exit. Apr 12 21:17:45.472999 systemd-logind[2105]: Removed session 21. Apr 12 21:17:45.545148 systemd[1]: Started sshd@22-147.28.150.175:22-139.178.89.65:37836.service. Apr 12 21:17:45.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.150.175:22-139.178.89.65:37836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:46.007000 audit[14302]: USER_ACCT pid=14302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:46.009265 sshd[14302]: Accepted publickey for core from 139.178.89.65 port 37836 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:46.008000 audit[14302]: CRED_ACQ pid=14302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:46.008000 audit[14302]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe35ea1c0 a2=3 a3=1 items=0 ppid=1 pid=14302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:46.008000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:46.010206 sshd[14302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:46.012872 systemd-logind[2105]: New session 22 of user core. Apr 12 21:17:46.013970 systemd[1]: Started session-22.scope. Apr 12 21:17:46.015000 audit[14302]: USER_START pid=14302 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:46.016000 audit[14304]: CRED_ACQ pid=14304 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:46.560795 sshd[14302]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:46.560000 audit[14302]: USER_END pid=14302 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:46.560000 audit[14302]: CRED_DISP pid=14302 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:46.562891 systemd[1]: sshd@22-147.28.150.175:22-139.178.89.65:37836.service: Deactivated successfully. Apr 12 21:17:46.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.150.175:22-139.178.89.65:37836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:46.563682 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 21:17:46.563941 systemd[1]: session-22.scope: Consumed 2.145s CPU time. Apr 12 21:17:46.564230 systemd-logind[2105]: Session 22 logged out. Waiting for processes to exit. Apr 12 21:17:46.564731 systemd-logind[2105]: Removed session 22. Apr 12 21:17:46.633327 systemd[1]: Started sshd@23-147.28.150.175:22-139.178.89.65:37848.service. Apr 12 21:17:46.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.150.175:22-139.178.89.65:37848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:47.083000 audit[14390]: USER_ACCT pid=14390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.085486 sshd[14390]: Accepted publickey for core from 139.178.89.65 port 37848 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:47.084000 audit[14390]: CRED_ACQ pid=14390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.084000 audit[14390]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdeafc40 a2=3 a3=1 items=0 ppid=1 pid=14390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:47.084000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:47.086418 sshd[14390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:47.089062 systemd-logind[2105]: New session 23 of user core. Apr 12 21:17:47.090125 systemd[1]: Started session-23.scope. Apr 12 21:17:47.091000 audit[14390]: USER_START pid=14390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.092000 audit[14392]: CRED_ACQ pid=14392 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.467912 sshd[14390]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:47.467000 audit[14390]: USER_END pid=14390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.472197 systemd[1]: sshd@23-147.28.150.175:22-139.178.89.65:37848.service: Deactivated successfully. Apr 12 21:17:47.473349 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 21:17:47.473866 systemd-logind[2105]: Session 23 logged out. Waiting for processes to exit. Apr 12 21:17:47.474350 systemd-logind[2105]: Removed session 23. Apr 12 21:17:47.480306 kernel: kauditd_printk_skb: 54 callbacks suppressed Apr 12 21:17:47.480359 kernel: audit: type=1106 audit(1712956667.467:1900): pid=14390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.467000 audit[14390]: CRED_DISP pid=14390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.579360 kernel: audit: type=1104 audit(1712956667.467:1901): pid=14390 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:47.579397 kernel: audit: type=1131 audit(1712956667.471:1902): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.150.175:22-139.178.89.65:37848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:47.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.150.175:22-139.178.89.65:37848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:51.426000 audit[14459]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=14459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:51.426000 audit[14459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc228de0 a2=0 a3=1 items=0 ppid=3947 pid=14459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:51.513169 kernel: audit: type=1325 audit(1712956671.426:1903): table=filter:127 family=2 entries=20 op=nft_register_rule pid=14459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:51.513337 kernel: audit: type=1300 audit(1712956671.426:1903): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc228de0 a2=0 a3=1 items=0 ppid=3947 pid=14459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:51.513400 kernel: audit: type=1327 audit(1712956671.426:1903): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:51.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:51.548000 audit[14459]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=14459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:51.548000 audit[14459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffc228de0 a2=0 a3=1 items=0 ppid=3947 pid=14459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:51.634521 kernel: audit: type=1325 audit(1712956671.548:1904): table=nat:128 family=2 entries=106 op=nft_register_chain pid=14459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:51.634567 kernel: audit: type=1300 audit(1712956671.548:1904): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffc228de0 a2=0 a3=1 items=0 ppid=3947 pid=14459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:51.634620 kernel: audit: type=1327 audit(1712956671.548:1904): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:51.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:52.543704 systemd[1]: Started sshd@24-147.28.150.175:22-139.178.89.65:41436.service. Apr 12 21:17:52.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.150.175:22-139.178.89.65:41436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:52.587468 kernel: audit: type=1130 audit(1712956672.543:1905): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.150.175:22-139.178.89.65:41436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:52.999000 audit[14463]: USER_ACCT pid=14463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.001002 sshd[14463]: Accepted publickey for core from 139.178.89.65 port 41436 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:53.002661 sshd[14463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:53.006812 systemd-logind[2105]: New session 24 of user core. Apr 12 21:17:53.008041 systemd[1]: Started session-24.scope. Apr 12 21:17:53.001000 audit[14463]: CRED_ACQ pid=14463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.103921 kernel: audit: type=1101 audit(1712956672.999:1906): pid=14463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.104027 kernel: audit: type=1103 audit(1712956673.001:1907): pid=14463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.104091 kernel: audit: type=1006 audit(1712956673.001:1908): pid=14463 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 21:17:53.001000 audit[14463]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4121510 a2=3 a3=1 items=0 ppid=1 pid=14463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:53.184971 kernel: audit: type=1300 audit(1712956673.001:1908): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4121510 a2=3 a3=1 items=0 ppid=1 pid=14463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:53.185019 kernel: audit: type=1327 audit(1712956673.001:1908): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:53.001000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:53.010000 audit[14463]: USER_START pid=14463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.262169 kernel: audit: type=1105 audit(1712956673.010:1909): pid=14463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.262197 kernel: audit: type=1103 audit(1712956673.012:1910): pid=14465 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.012000 audit[14465]: CRED_ACQ pid=14465 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.391095 sshd[14463]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:53.391000 audit[14463]: USER_END pid=14463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.395567 systemd[1]: sshd@24-147.28.150.175:22-139.178.89.65:41436.service: Deactivated successfully. Apr 12 21:17:53.396683 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 21:17:53.397157 systemd-logind[2105]: Session 24 logged out. Waiting for processes to exit. Apr 12 21:17:53.397627 systemd-logind[2105]: Removed session 24. Apr 12 21:17:53.391000 audit[14463]: CRED_DISP pid=14463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.491561 kernel: audit: type=1106 audit(1712956673.391:1911): pid=14463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.491613 kernel: audit: type=1104 audit(1712956673.391:1912): pid=14463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:53.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.150.175:22-139.178.89.65:41436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:55.878000 audit[6767]: AVC avc: denied { watch } for pid=6767 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3629159358/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c268,c842 tclass=file permissive=0 Apr 12 21:17:55.878000 audit[6767]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010807c0 a2=fc6 a3=0 items=0 ppid=6645 pid=6767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c842 key=(null) Apr 12 21:17:55.878000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:17:55.942000 audit[6713]: AVC avc: denied { watch } for pid=6713 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_20_50_53.3559291730/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c734,c1002 tclass=file permissive=0 Apr 12 21:17:55.942000 audit[6713]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e42680 a2=fc6 a3=0 items=0 ppid=6607 pid=6713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c734,c1002 key=(null) Apr 12 21:17:55.942000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 21:17:58.467936 systemd[1]: Started sshd@25-147.28.150.175:22-139.178.89.65:58180.service. Apr 12 21:17:58.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.150.175:22-139.178.89.65:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:58.480034 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 21:17:58.480376 kernel: audit: type=1130 audit(1712956678.467:1916): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.150.175:22-139.178.89.65:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:58.923000 audit[14538]: USER_ACCT pid=14538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:58.925238 sshd[14538]: Accepted publickey for core from 139.178.89.65 port 58180 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:58.926933 sshd[14538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:58.931199 systemd-logind[2105]: New session 25 of user core. Apr 12 21:17:58.932484 systemd[1]: Started session-25.scope. Apr 12 21:17:58.926000 audit[14538]: CRED_ACQ pid=14538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.028482 kernel: audit: type=1101 audit(1712956678.923:1917): pid=14538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.028555 kernel: audit: type=1103 audit(1712956678.926:1918): pid=14538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.028598 kernel: audit: type=1006 audit(1712956678.926:1919): pid=14538 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 21:17:58.926000 audit[14538]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea667770 a2=3 a3=1 items=0 ppid=1 pid=14538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:59.109873 kernel: audit: type=1300 audit(1712956678.926:1919): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea667770 a2=3 a3=1 items=0 ppid=1 pid=14538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:59.109900 kernel: audit: type=1327 audit(1712956678.926:1919): proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:58.926000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:58.934000 audit[14538]: USER_START pid=14538 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.186896 kernel: audit: type=1105 audit(1712956678.934:1920): pid=14538 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.186926 kernel: audit: type=1103 audit(1712956678.936:1921): pid=14540 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:58.936000 audit[14540]: CRED_ACQ pid=14540 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.316714 sshd[14538]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:59.316000 audit[14538]: USER_END pid=14538 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.321122 systemd[1]: sshd@25-147.28.150.175:22-139.178.89.65:58180.service: Deactivated successfully. Apr 12 21:17:59.322217 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 21:17:59.322711 systemd-logind[2105]: Session 25 logged out. Waiting for processes to exit. Apr 12 21:17:59.323202 systemd-logind[2105]: Removed session 25. Apr 12 21:17:59.316000 audit[14538]: CRED_DISP pid=14538 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.416898 kernel: audit: type=1106 audit(1712956679.316:1922): pid=14538 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.416931 kernel: audit: type=1104 audit(1712956679.316:1923): pid=14538 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:59.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.150.175:22-139.178.89.65:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:18:02.140000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.140000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4012f407b0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:18:02.140000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:18:02.140000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.140000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006822330 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:18:02.140000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:18:02.140000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.140000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4009309640 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:18:02.140000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:18:02.190000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524869 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.190000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40068223f0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:18:02.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:18:02.191000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.191000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400950dd40 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:18:02.191000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:18:02.191000 audit[3221]: AVC avc: denied { watch } for pid=3221 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.191000 audit[3221]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40093096a0 a2=fc6 a3=0 items=0 ppid=3068 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c434,c966 key=(null) Apr 12 21:18:02.191000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3135302E313735002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Apr 12 21:18:02.588000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.588000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b4f200 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:18:02.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:18:02.588000 audit[3223]: AVC avc: denied { watch } for pid=3223 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 21:18:02.588000 audit[3223]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400269c570 a2=fc6 a3=0 items=0 ppid=3067 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c483 key=(null) Apr 12 21:18:02.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 21:18:04.393744 systemd[1]: Started sshd@26-147.28.150.175:22-139.178.89.65:58182.service. Apr 12 21:18:04.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.150.175:22-139.178.89.65:58182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:18:04.405578 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 21:18:04.405812 kernel: audit: type=1130 audit(1712956684.393:1933): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.150.175:22-139.178.89.65:58182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:18:04.856000 audit[14611]: USER_ACCT pid=14611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:04.857696 sshd[14611]: Accepted publickey for core from 139.178.89.65 port 58182 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:18:04.859675 sshd[14611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:18:04.863910 systemd-logind[2105]: New session 26 of user core. Apr 12 21:18:04.865209 systemd[1]: Started session-26.scope. Apr 12 21:18:04.910486 kernel: audit: type=1101 audit(1712956684.856:1934): pid=14611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:04.910617 kernel: audit: type=1103 audit(1712956684.858:1935): pid=14611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:04.858000 audit[14611]: CRED_ACQ pid=14611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:04.989684 kernel: audit: type=1006 audit(1712956684.858:1936): pid=14611 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 21:18:04.989785 kernel: audit: type=1300 audit(1712956684.858:1936): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9098ba0 a2=3 a3=1 items=0 ppid=1 pid=14611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:04.858000 audit[14611]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9098ba0 a2=3 a3=1 items=0 ppid=1 pid=14611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:04.858000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:18:05.063804 kernel: audit: type=1327 audit(1712956684.858:1936): proctitle=737368643A20636F7265205B707269765D Apr 12 21:18:05.063847 kernel: audit: type=1105 audit(1712956684.867:1937): pid=14611 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:04.867000 audit[14611]: USER_START pid=14611 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:04.869000 audit[14613]: CRED_ACQ pid=14613 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:05.164587 kernel: audit: type=1103 audit(1712956684.869:1938): pid=14613 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:05.255169 sshd[14611]: pam_unix(sshd:session): session closed for user core Apr 12 21:18:05.255000 audit[14611]: USER_END pid=14611 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:05.259513 systemd[1]: sshd@26-147.28.150.175:22-139.178.89.65:58182.service: Deactivated successfully. Apr 12 21:18:05.260606 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 21:18:05.261069 systemd-logind[2105]: Session 26 logged out. Waiting for processes to exit. Apr 12 21:18:05.261715 systemd-logind[2105]: Removed session 26. Apr 12 21:18:05.255000 audit[14611]: CRED_DISP pid=14611 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:05.355251 kernel: audit: type=1106 audit(1712956685.255:1939): pid=14611 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:05.355294 kernel: audit: type=1104 audit(1712956685.255:1940): pid=14611 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:18:05.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.150.175:22-139.178.89.65:58182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'