Apr 12 19:39:50.704334 kernel: Booting Linux on physical CPU 0x0000120000 [0x413fd0c1] Apr 12 19:39:50.704353 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 19:39:50.704361 kernel: efi: EFI v2.70 by American Megatrends Apr 12 19:39:50.704367 kernel: efi: ACPI 2.0=0xec080000 SMBIOS 3.0=0xf0a1ff98 ESRT=0xea451818 RNG=0xebf10018 MEMRESERVE=0xe4626f98 Apr 12 19:39:50.704372 kernel: random: crng init done Apr 12 19:39:50.704377 kernel: esrt: Reserving ESRT space from 0x00000000ea451818 to 0x00000000ea451878. Apr 12 19:39:50.704383 kernel: ACPI: Early table checksum verification disabled Apr 12 19:39:50.704389 kernel: ACPI: RSDP 0x00000000EC080000 000024 (v02 Ampere) Apr 12 19:39:50.704395 kernel: ACPI: XSDT 0x00000000EC070000 0000A4 (v01 Ampere Altra 00000000 AMI 01000013) Apr 12 19:39:50.704401 kernel: ACPI: FACP 0x00000000EC050000 000114 (v06 Ampere Altra 00000000 INTL 20190509) Apr 12 19:39:50.704406 kernel: ACPI: DSDT 0x00000000EBFF0000 019B57 (v02 Ampere Jade 00000001 INTL 20200717) Apr 12 19:39:50.704411 kernel: ACPI: DBG2 0x00000000EC060000 00005C (v00 Ampere Altra 00000000 INTL 20190509) Apr 12 19:39:50.704416 kernel: ACPI: GTDT 0x00000000EC040000 000110 (v03 Ampere Altra 00000000 INTL 20190509) Apr 12 19:39:50.704422 kernel: ACPI: SSDT 0x00000000EC030000 00002D (v02 Ampere Altra 00000001 INTL 20190509) Apr 12 19:39:50.704430 kernel: ACPI: FIDT 0x00000000EBFE0000 00009C (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 19:39:50.704435 kernel: ACPI: SPCR 0x00000000EBFD0000 000050 (v02 ALASKA A M I 01072009 AMI 0005000F) Apr 12 19:39:50.704441 kernel: ACPI: BGRT 0x00000000EBFC0000 000038 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 19:39:50.704447 kernel: ACPI: MCFG 0x00000000EBFB0000 0000AC (v01 Ampere Altra 00000001 AMP. 01000013) Apr 12 19:39:50.704452 kernel: ACPI: IORT 0x00000000EBFA0000 000610 (v00 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:39:50.704458 kernel: ACPI: PPTT 0x00000000EBF80000 006E60 (v02 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:39:50.704464 kernel: ACPI: SLIT 0x00000000EBF70000 00002D (v01 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:39:50.704469 kernel: ACPI: SRAT 0x00000000EBF60000 0006D0 (v03 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:39:50.704475 kernel: ACPI: APIC 0x00000000EBF90000 0019F4 (v05 Ampere Altra 00000003 AMI 01000013) Apr 12 19:39:50.704482 kernel: ACPI: PCCT 0x00000000EBF40000 000576 (v02 Ampere Altra 00000003 AMP. 01000013) Apr 12 19:39:50.704488 kernel: ACPI: WSMT 0x00000000EBF30000 000028 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 19:39:50.704494 kernel: ACPI: FPDT 0x00000000EBF20000 000044 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 12 19:39:50.704499 kernel: ACPI: SPCR: console: pl011,mmio32,0x100002600000,115200 Apr 12 19:39:50.704505 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x88300000-0x883fffff] Apr 12 19:39:50.704511 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x90000000-0xffffffff] Apr 12 19:39:50.704516 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0x8007fffffff] Apr 12 19:39:50.704522 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80100000000-0x83fffffffff] Apr 12 19:39:50.704528 kernel: NUMA: NODE_DATA [mem 0x83fdffcd900-0x83fdffd2fff] Apr 12 19:39:50.704533 kernel: Zone ranges: Apr 12 19:39:50.704539 kernel: DMA [mem 0x0000000088300000-0x00000000ffffffff] Apr 12 19:39:50.704544 kernel: DMA32 empty Apr 12 19:39:50.704551 kernel: Normal [mem 0x0000000100000000-0x0000083fffffffff] Apr 12 19:39:50.704557 kernel: Movable zone start for each node Apr 12 19:39:50.704562 kernel: Early memory node ranges Apr 12 19:39:50.704568 kernel: node 0: [mem 0x0000000088300000-0x00000000883fffff] Apr 12 19:39:50.704574 kernel: node 0: [mem 0x0000000090000000-0x0000000091ffffff] Apr 12 19:39:50.704582 kernel: node 0: [mem 0x0000000092000000-0x0000000093ffffff] Apr 12 19:39:50.704588 kernel: node 0: [mem 0x0000000094000000-0x00000000eba31fff] Apr 12 19:39:50.704595 kernel: node 0: [mem 0x00000000eba32000-0x00000000ebea8fff] Apr 12 19:39:50.704601 kernel: node 0: [mem 0x00000000ebea9000-0x00000000ebeaefff] Apr 12 19:39:50.704607 kernel: node 0: [mem 0x00000000ebeaf000-0x00000000ebeccfff] Apr 12 19:39:50.704613 kernel: node 0: [mem 0x00000000ebecd000-0x00000000ebecdfff] Apr 12 19:39:50.704619 kernel: node 0: [mem 0x00000000ebece000-0x00000000ebecffff] Apr 12 19:39:50.704625 kernel: node 0: [mem 0x00000000ebed0000-0x00000000ec0effff] Apr 12 19:39:50.704631 kernel: node 0: [mem 0x00000000ec0f0000-0x00000000ec0fffff] Apr 12 19:39:50.704637 kernel: node 0: [mem 0x00000000ec100000-0x00000000ee54ffff] Apr 12 19:39:50.704643 kernel: node 0: [mem 0x00000000ee550000-0x00000000f765ffff] Apr 12 19:39:50.704650 kernel: node 0: [mem 0x00000000f7660000-0x00000000f784ffff] Apr 12 19:39:50.704656 kernel: node 0: [mem 0x00000000f7850000-0x00000000f7fdffff] Apr 12 19:39:50.704662 kernel: node 0: [mem 0x00000000f7fe0000-0x00000000ffc8efff] Apr 12 19:39:50.704668 kernel: node 0: [mem 0x00000000ffc8f000-0x00000000ffc8ffff] Apr 12 19:39:50.704674 kernel: node 0: [mem 0x00000000ffc90000-0x00000000ffffffff] Apr 12 19:39:50.704680 kernel: node 0: [mem 0x0000080000000000-0x000008007fffffff] Apr 12 19:39:50.704685 kernel: node 0: [mem 0x0000080100000000-0x0000083fffffffff] Apr 12 19:39:50.704692 kernel: Initmem setup node 0 [mem 0x0000000088300000-0x0000083fffffffff] Apr 12 19:39:50.704697 kernel: On node 0, zone DMA: 768 pages in unavailable ranges Apr 12 19:39:50.704703 kernel: On node 0, zone DMA: 31744 pages in unavailable ranges Apr 12 19:39:50.704709 kernel: psci: probing for conduit method from ACPI. Apr 12 19:39:50.704715 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 19:39:50.704722 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 19:39:50.704728 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 19:39:50.704734 kernel: psci: SMC Calling Convention v1.2 Apr 12 19:39:50.704740 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node 0 Apr 12 19:39:50.704746 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100 -> Node 0 Apr 12 19:39:50.704753 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10000 -> Node 0 Apr 12 19:39:50.704759 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10100 -> Node 0 Apr 12 19:39:50.704765 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20000 -> Node 0 Apr 12 19:39:50.704770 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20100 -> Node 0 Apr 12 19:39:50.704776 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30000 -> Node 0 Apr 12 19:39:50.704782 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30100 -> Node 0 Apr 12 19:39:50.704788 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40000 -> Node 0 Apr 12 19:39:50.704795 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40100 -> Node 0 Apr 12 19:39:50.704801 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50000 -> Node 0 Apr 12 19:39:50.704807 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50100 -> Node 0 Apr 12 19:39:50.704813 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60000 -> Node 0 Apr 12 19:39:50.704819 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60100 -> Node 0 Apr 12 19:39:50.704825 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70000 -> Node 0 Apr 12 19:39:50.704831 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70100 -> Node 0 Apr 12 19:39:50.704837 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80000 -> Node 0 Apr 12 19:39:50.704843 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80100 -> Node 0 Apr 12 19:39:50.704849 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90000 -> Node 0 Apr 12 19:39:50.704854 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90100 -> Node 0 Apr 12 19:39:50.704860 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0000 -> Node 0 Apr 12 19:39:50.704867 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0100 -> Node 0 Apr 12 19:39:50.704873 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0000 -> Node 0 Apr 12 19:39:50.704879 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0100 -> Node 0 Apr 12 19:39:50.704885 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0000 -> Node 0 Apr 12 19:39:50.704891 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0100 -> Node 0 Apr 12 19:39:50.704897 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0000 -> Node 0 Apr 12 19:39:50.704903 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0100 -> Node 0 Apr 12 19:39:50.704909 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0000 -> Node 0 Apr 12 19:39:50.704915 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0100 -> Node 0 Apr 12 19:39:50.704920 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0000 -> Node 0 Apr 12 19:39:50.704926 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0100 -> Node 0 Apr 12 19:39:50.704933 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100000 -> Node 0 Apr 12 19:39:50.704939 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100100 -> Node 0 Apr 12 19:39:50.704945 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110000 -> Node 0 Apr 12 19:39:50.704951 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110100 -> Node 0 Apr 12 19:39:50.704957 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120000 -> Node 0 Apr 12 19:39:50.704963 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120100 -> Node 0 Apr 12 19:39:50.704969 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130000 -> Node 0 Apr 12 19:39:50.704975 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130100 -> Node 0 Apr 12 19:39:50.704981 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140000 -> Node 0 Apr 12 19:39:50.704987 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140100 -> Node 0 Apr 12 19:39:50.704993 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150000 -> Node 0 Apr 12 19:39:50.704999 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150100 -> Node 0 Apr 12 19:39:50.705006 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160000 -> Node 0 Apr 12 19:39:50.705012 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160100 -> Node 0 Apr 12 19:39:50.705018 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170000 -> Node 0 Apr 12 19:39:50.705024 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170100 -> Node 0 Apr 12 19:39:50.705030 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180000 -> Node 0 Apr 12 19:39:50.705036 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180100 -> Node 0 Apr 12 19:39:50.705042 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190000 -> Node 0 Apr 12 19:39:50.705048 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190100 -> Node 0 Apr 12 19:39:50.705060 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0000 -> Node 0 Apr 12 19:39:50.705066 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0100 -> Node 0 Apr 12 19:39:50.705074 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0000 -> Node 0 Apr 12 19:39:50.705080 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0100 -> Node 0 Apr 12 19:39:50.705086 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0000 -> Node 0 Apr 12 19:39:50.705093 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0100 -> Node 0 Apr 12 19:39:50.705099 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0000 -> Node 0 Apr 12 19:39:50.705105 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0100 -> Node 0 Apr 12 19:39:50.705113 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0000 -> Node 0 Apr 12 19:39:50.705119 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0100 -> Node 0 Apr 12 19:39:50.705125 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0000 -> Node 0 Apr 12 19:39:50.705131 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0100 -> Node 0 Apr 12 19:39:50.705138 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200000 -> Node 0 Apr 12 19:39:50.705144 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200100 -> Node 0 Apr 12 19:39:50.705151 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210000 -> Node 0 Apr 12 19:39:50.705157 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210100 -> Node 0 Apr 12 19:39:50.705163 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220000 -> Node 0 Apr 12 19:39:50.705169 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220100 -> Node 0 Apr 12 19:39:50.705176 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230000 -> Node 0 Apr 12 19:39:50.705183 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230100 -> Node 0 Apr 12 19:39:50.705190 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240000 -> Node 0 Apr 12 19:39:50.705196 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240100 -> Node 0 Apr 12 19:39:50.705202 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250000 -> Node 0 Apr 12 19:39:50.705209 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250100 -> Node 0 Apr 12 19:39:50.705215 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260000 -> Node 0 Apr 12 19:39:50.705221 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260100 -> Node 0 Apr 12 19:39:50.705227 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270000 -> Node 0 Apr 12 19:39:50.705234 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270100 -> Node 0 Apr 12 19:39:50.705240 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 19:39:50.705246 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 19:39:50.705253 kernel: pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07 Apr 12 19:39:50.705261 kernel: pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15 Apr 12 19:39:50.705267 kernel: pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23 Apr 12 19:39:50.705273 kernel: pcpu-alloc: [0] 24 [0] 25 [0] 26 [0] 27 [0] 28 [0] 29 [0] 30 [0] 31 Apr 12 19:39:50.705280 kernel: pcpu-alloc: [0] 32 [0] 33 [0] 34 [0] 35 [0] 36 [0] 37 [0] 38 [0] 39 Apr 12 19:39:50.705286 kernel: pcpu-alloc: [0] 40 [0] 41 [0] 42 [0] 43 [0] 44 [0] 45 [0] 46 [0] 47 Apr 12 19:39:50.705293 kernel: pcpu-alloc: [0] 48 [0] 49 [0] 50 [0] 51 [0] 52 [0] 53 [0] 54 [0] 55 Apr 12 19:39:50.705302 kernel: pcpu-alloc: [0] 56 [0] 57 [0] 58 [0] 59 [0] 60 [0] 61 [0] 62 [0] 63 Apr 12 19:39:50.705308 kernel: pcpu-alloc: [0] 64 [0] 65 [0] 66 [0] 67 [0] 68 [0] 69 [0] 70 [0] 71 Apr 12 19:39:50.705315 kernel: pcpu-alloc: [0] 72 [0] 73 [0] 74 [0] 75 [0] 76 [0] 77 [0] 78 [0] 79 Apr 12 19:39:50.705321 kernel: Detected PIPT I-cache on CPU0 Apr 12 19:39:50.705327 kernel: CPU features: detected: GIC system register CPU interface Apr 12 19:39:50.705335 kernel: CPU features: detected: Virtualization Host Extensions Apr 12 19:39:50.705341 kernel: CPU features: detected: Hardware dirty bit management Apr 12 19:39:50.705348 kernel: CPU features: detected: Spectre-v4 Apr 12 19:39:50.705354 kernel: CPU features: detected: Spectre-BHB Apr 12 19:39:50.705360 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 19:39:50.705367 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 19:39:50.705373 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 19:39:50.705379 kernel: alternatives: patching kernel code Apr 12 19:39:50.705386 kernel: Built 1 zonelists, mobility grouping on. Total pages: 65996028 Apr 12 19:39:50.705392 kernel: Policy zone: Normal Apr 12 19:39:50.705400 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 19:39:50.705408 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 19:39:50.705414 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Apr 12 19:39:50.705420 kernel: printk: log_buf_len total cpu_extra contributions: 323584 bytes Apr 12 19:39:50.705427 kernel: printk: log_buf_len min size: 262144 bytes Apr 12 19:39:50.705433 kernel: printk: log_buf_len: 1048576 bytes Apr 12 19:39:50.705439 kernel: printk: early log buf free: 249888(95%) Apr 12 19:39:50.705446 kernel: Dentry cache hash table entries: 16777216 (order: 15, 134217728 bytes, linear) Apr 12 19:39:50.705452 kernel: Inode-cache hash table entries: 8388608 (order: 14, 67108864 bytes, linear) Apr 12 19:39:50.705458 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 19:39:50.705465 kernel: software IO TLB: mapped [mem 0x00000000fbc8f000-0x00000000ffc8f000] (64MB) Apr 12 19:39:50.705471 kernel: Memory: 262927124K/268174336K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 5247212K reserved, 0K cma-reserved) Apr 12 19:39:50.705479 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=80, Nodes=1 Apr 12 19:39:50.705485 kernel: trace event string verifier disabled Apr 12 19:39:50.705492 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 19:39:50.705499 kernel: rcu: RCU event tracing is enabled. Apr 12 19:39:50.705505 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=80. Apr 12 19:39:50.705512 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 19:39:50.705518 kernel: Tracing variant of Tasks RCU enabled. Apr 12 19:39:50.705524 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 19:39:50.705531 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=80 Apr 12 19:39:50.705537 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 19:39:50.705544 kernel: GICv3: GIC: Using split EOI/Deactivate mode Apr 12 19:39:50.705551 kernel: GICv3: 672 SPIs implemented Apr 12 19:39:50.705558 kernel: GICv3: 0 Extended SPIs implemented Apr 12 19:39:50.705564 kernel: GICv3: Distributor has no Range Selector support Apr 12 19:39:50.705570 kernel: Root IRQ handler: gic_handle_irq Apr 12 19:39:50.705577 kernel: GICv3: 16 PPIs implemented Apr 12 19:39:50.705583 kernel: GICv3: CPU0: found redistributor 120000 region 0:0x00001001005c0000 Apr 12 19:39:50.705589 kernel: SRAT: PXM 0 -> ITS 0 -> Node 0 Apr 12 19:39:50.705596 kernel: SRAT: PXM 0 -> ITS 1 -> Node 0 Apr 12 19:39:50.705602 kernel: SRAT: PXM 0 -> ITS 2 -> Node 0 Apr 12 19:39:50.705608 kernel: SRAT: PXM 0 -> ITS 3 -> Node 0 Apr 12 19:39:50.705614 kernel: SRAT: PXM 0 -> ITS 4 -> Node 0 Apr 12 19:39:50.705621 kernel: SRAT: PXM 0 -> ITS 5 -> Node 0 Apr 12 19:39:50.705627 kernel: SRAT: PXM 0 -> ITS 6 -> Node 0 Apr 12 19:39:50.705634 kernel: SRAT: PXM 0 -> ITS 7 -> Node 0 Apr 12 19:39:50.705641 kernel: ITS [mem 0x100100040000-0x10010005ffff] Apr 12 19:39:50.705647 kernel: ITS@0x0000100100040000: allocated 8192 Devices @80000200000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705654 kernel: ITS@0x0000100100040000: allocated 32768 Interrupt Collections @80000210000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705660 kernel: ITS [mem 0x100100060000-0x10010007ffff] Apr 12 19:39:50.705667 kernel: ITS@0x0000100100060000: allocated 8192 Devices @80000230000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705673 kernel: ITS@0x0000100100060000: allocated 32768 Interrupt Collections @80000240000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705680 kernel: ITS [mem 0x100100080000-0x10010009ffff] Apr 12 19:39:50.705686 kernel: ITS@0x0000100100080000: allocated 8192 Devices @80000260000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705693 kernel: ITS@0x0000100100080000: allocated 32768 Interrupt Collections @80000270000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705699 kernel: ITS [mem 0x1001000a0000-0x1001000bffff] Apr 12 19:39:50.705707 kernel: ITS@0x00001001000a0000: allocated 8192 Devices @80000290000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705713 kernel: ITS@0x00001001000a0000: allocated 32768 Interrupt Collections @800002a0000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705720 kernel: ITS [mem 0x1001000c0000-0x1001000dffff] Apr 12 19:39:50.705726 kernel: ITS@0x00001001000c0000: allocated 8192 Devices @800002c0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705733 kernel: ITS@0x00001001000c0000: allocated 32768 Interrupt Collections @800002d0000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705739 kernel: ITS [mem 0x1001000e0000-0x1001000fffff] Apr 12 19:39:50.705745 kernel: ITS@0x00001001000e0000: allocated 8192 Devices @80000300000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705752 kernel: ITS@0x00001001000e0000: allocated 32768 Interrupt Collections @80000310000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705758 kernel: ITS [mem 0x100100100000-0x10010011ffff] Apr 12 19:39:50.705765 kernel: ITS@0x0000100100100000: allocated 8192 Devices @80000330000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705771 kernel: ITS@0x0000100100100000: allocated 32768 Interrupt Collections @80000340000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705779 kernel: ITS [mem 0x100100120000-0x10010013ffff] Apr 12 19:39:50.705785 kernel: ITS@0x0000100100120000: allocated 8192 Devices @80000360000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:39:50.705792 kernel: ITS@0x0000100100120000: allocated 32768 Interrupt Collections @80000370000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:39:50.705798 kernel: GICv3: using LPI property table @0x0000080000380000 Apr 12 19:39:50.705804 kernel: GICv3: CPU0: using allocated LPI pending table @0x0000080000390000 Apr 12 19:39:50.705811 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.705817 kernel: ACPI GTDT: found 1 memory-mapped timer block(s). Apr 12 19:39:50.705824 kernel: arch_timer: cp15 and mmio timer(s) running at 25.00MHz (phys/phys). Apr 12 19:39:50.705830 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 19:39:50.705837 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 19:39:50.705843 kernel: Console: colour dummy device 80x25 Apr 12 19:39:50.705851 kernel: printk: console [tty0] enabled Apr 12 19:39:50.705857 kernel: ACPI: Core revision 20210730 Apr 12 19:39:50.705864 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 19:39:50.705871 kernel: pid_max: default: 81920 minimum: 640 Apr 12 19:39:50.705877 kernel: LSM: Security Framework initializing Apr 12 19:39:50.705884 kernel: SELinux: Initializing. Apr 12 19:39:50.705890 kernel: Mount-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:39:50.705897 kernel: Mountpoint-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:39:50.705904 kernel: rcu: Hierarchical SRCU implementation. Apr 12 19:39:50.705911 kernel: Platform MSI: ITS@0x100100040000 domain created Apr 12 19:39:50.705918 kernel: Platform MSI: ITS@0x100100060000 domain created Apr 12 19:39:50.705925 kernel: Platform MSI: ITS@0x100100080000 domain created Apr 12 19:39:50.705931 kernel: Platform MSI: ITS@0x1001000a0000 domain created Apr 12 19:39:50.705937 kernel: Platform MSI: ITS@0x1001000c0000 domain created Apr 12 19:39:50.705944 kernel: Platform MSI: ITS@0x1001000e0000 domain created Apr 12 19:39:50.705951 kernel: Platform MSI: ITS@0x100100100000 domain created Apr 12 19:39:50.705957 kernel: Platform MSI: ITS@0x100100120000 domain created Apr 12 19:39:50.705964 kernel: PCI/MSI: ITS@0x100100040000 domain created Apr 12 19:39:50.705972 kernel: PCI/MSI: ITS@0x100100060000 domain created Apr 12 19:39:50.705978 kernel: PCI/MSI: ITS@0x100100080000 domain created Apr 12 19:39:50.705985 kernel: PCI/MSI: ITS@0x1001000a0000 domain created Apr 12 19:39:50.705991 kernel: PCI/MSI: ITS@0x1001000c0000 domain created Apr 12 19:39:50.705998 kernel: PCI/MSI: ITS@0x1001000e0000 domain created Apr 12 19:39:50.706004 kernel: PCI/MSI: ITS@0x100100100000 domain created Apr 12 19:39:50.706010 kernel: PCI/MSI: ITS@0x100100120000 domain created Apr 12 19:39:50.706017 kernel: Remapping and enabling EFI services. Apr 12 19:39:50.706023 kernel: smp: Bringing up secondary CPUs ... Apr 12 19:39:50.706030 kernel: Detected PIPT I-cache on CPU1 Apr 12 19:39:50.706038 kernel: GICv3: CPU1: found redistributor 1a0000 region 0:0x00001001007c0000 Apr 12 19:39:50.706044 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000800003a0000 Apr 12 19:39:50.706051 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706058 kernel: CPU1: Booted secondary processor 0x00001a0000 [0x413fd0c1] Apr 12 19:39:50.706064 kernel: Detected PIPT I-cache on CPU2 Apr 12 19:39:50.706071 kernel: GICv3: CPU2: found redistributor 140000 region 0:0x0000100100640000 Apr 12 19:39:50.706077 kernel: GICv3: CPU2: using allocated LPI pending table @0x00000800003b0000 Apr 12 19:39:50.706084 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706090 kernel: CPU2: Booted secondary processor 0x0000140000 [0x413fd0c1] Apr 12 19:39:50.706098 kernel: Detected PIPT I-cache on CPU3 Apr 12 19:39:50.706105 kernel: GICv3: CPU3: found redistributor 1c0000 region 0:0x0000100100840000 Apr 12 19:39:50.706111 kernel: GICv3: CPU3: using allocated LPI pending table @0x00000800003c0000 Apr 12 19:39:50.706118 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706124 kernel: CPU3: Booted secondary processor 0x00001c0000 [0x413fd0c1] Apr 12 19:39:50.706130 kernel: Detected PIPT I-cache on CPU4 Apr 12 19:39:50.706137 kernel: GICv3: CPU4: found redistributor 100000 region 0:0x0000100100540000 Apr 12 19:39:50.706144 kernel: GICv3: CPU4: using allocated LPI pending table @0x00000800003d0000 Apr 12 19:39:50.706150 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706156 kernel: CPU4: Booted secondary processor 0x0000100000 [0x413fd0c1] Apr 12 19:39:50.706164 kernel: Detected PIPT I-cache on CPU5 Apr 12 19:39:50.706170 kernel: GICv3: CPU5: found redistributor 180000 region 0:0x0000100100740000 Apr 12 19:39:50.706177 kernel: GICv3: CPU5: using allocated LPI pending table @0x00000800003e0000 Apr 12 19:39:50.706184 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706190 kernel: CPU5: Booted secondary processor 0x0000180000 [0x413fd0c1] Apr 12 19:39:50.706196 kernel: Detected PIPT I-cache on CPU6 Apr 12 19:39:50.706203 kernel: GICv3: CPU6: found redistributor 160000 region 0:0x00001001006c0000 Apr 12 19:39:50.706210 kernel: GICv3: CPU6: using allocated LPI pending table @0x00000800003f0000 Apr 12 19:39:50.706216 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706224 kernel: CPU6: Booted secondary processor 0x0000160000 [0x413fd0c1] Apr 12 19:39:50.706230 kernel: Detected PIPT I-cache on CPU7 Apr 12 19:39:50.706237 kernel: GICv3: CPU7: found redistributor 1e0000 region 0:0x00001001008c0000 Apr 12 19:39:50.706243 kernel: GICv3: CPU7: using allocated LPI pending table @0x0000080000800000 Apr 12 19:39:50.706250 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706256 kernel: CPU7: Booted secondary processor 0x00001e0000 [0x413fd0c1] Apr 12 19:39:50.706263 kernel: Detected PIPT I-cache on CPU8 Apr 12 19:39:50.706269 kernel: GICv3: CPU8: found redistributor a0000 region 0:0x00001001003c0000 Apr 12 19:39:50.706276 kernel: GICv3: CPU8: using allocated LPI pending table @0x0000080000810000 Apr 12 19:39:50.706282 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706290 kernel: CPU8: Booted secondary processor 0x00000a0000 [0x413fd0c1] Apr 12 19:39:50.706298 kernel: Detected PIPT I-cache on CPU9 Apr 12 19:39:50.706305 kernel: GICv3: CPU9: found redistributor 220000 region 0:0x00001001009c0000 Apr 12 19:39:50.706311 kernel: GICv3: CPU9: using allocated LPI pending table @0x0000080000820000 Apr 12 19:39:50.706318 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706324 kernel: CPU9: Booted secondary processor 0x0000220000 [0x413fd0c1] Apr 12 19:39:50.706331 kernel: Detected PIPT I-cache on CPU10 Apr 12 19:39:50.706337 kernel: GICv3: CPU10: found redistributor c0000 region 0:0x0000100100440000 Apr 12 19:39:50.706344 kernel: GICv3: CPU10: using allocated LPI pending table @0x0000080000830000 Apr 12 19:39:50.706352 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706358 kernel: CPU10: Booted secondary processor 0x00000c0000 [0x413fd0c1] Apr 12 19:39:50.706365 kernel: Detected PIPT I-cache on CPU11 Apr 12 19:39:50.706372 kernel: GICv3: CPU11: found redistributor 240000 region 0:0x0000100100a40000 Apr 12 19:39:50.706378 kernel: GICv3: CPU11: using allocated LPI pending table @0x0000080000840000 Apr 12 19:39:50.706385 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706391 kernel: CPU11: Booted secondary processor 0x0000240000 [0x413fd0c1] Apr 12 19:39:50.706398 kernel: Detected PIPT I-cache on CPU12 Apr 12 19:39:50.706404 kernel: GICv3: CPU12: found redistributor 80000 region 0:0x0000100100340000 Apr 12 19:39:50.706411 kernel: GICv3: CPU12: using allocated LPI pending table @0x0000080000850000 Apr 12 19:39:50.706418 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706425 kernel: CPU12: Booted secondary processor 0x0000080000 [0x413fd0c1] Apr 12 19:39:50.706431 kernel: Detected PIPT I-cache on CPU13 Apr 12 19:39:50.706438 kernel: GICv3: CPU13: found redistributor 200000 region 0:0x0000100100940000 Apr 12 19:39:50.706445 kernel: GICv3: CPU13: using allocated LPI pending table @0x0000080000860000 Apr 12 19:39:50.706451 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706458 kernel: CPU13: Booted secondary processor 0x0000200000 [0x413fd0c1] Apr 12 19:39:50.706464 kernel: Detected PIPT I-cache on CPU14 Apr 12 19:39:50.706471 kernel: GICv3: CPU14: found redistributor e0000 region 0:0x00001001004c0000 Apr 12 19:39:50.706479 kernel: GICv3: CPU14: using allocated LPI pending table @0x0000080000870000 Apr 12 19:39:50.706485 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706492 kernel: CPU14: Booted secondary processor 0x00000e0000 [0x413fd0c1] Apr 12 19:39:50.706498 kernel: Detected PIPT I-cache on CPU15 Apr 12 19:39:50.706505 kernel: GICv3: CPU15: found redistributor 260000 region 0:0x0000100100ac0000 Apr 12 19:39:50.706512 kernel: GICv3: CPU15: using allocated LPI pending table @0x0000080000880000 Apr 12 19:39:50.706518 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706524 kernel: CPU15: Booted secondary processor 0x0000260000 [0x413fd0c1] Apr 12 19:39:50.706531 kernel: Detected PIPT I-cache on CPU16 Apr 12 19:39:50.706539 kernel: GICv3: CPU16: found redistributor 20000 region 0:0x00001001001c0000 Apr 12 19:39:50.706545 kernel: GICv3: CPU16: using allocated LPI pending table @0x0000080000890000 Apr 12 19:39:50.706552 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706558 kernel: CPU16: Booted secondary processor 0x0000020000 [0x413fd0c1] Apr 12 19:39:50.706565 kernel: Detected PIPT I-cache on CPU17 Apr 12 19:39:50.706571 kernel: GICv3: CPU17: found redistributor 40000 region 0:0x0000100100240000 Apr 12 19:39:50.706578 kernel: GICv3: CPU17: using allocated LPI pending table @0x00000800008a0000 Apr 12 19:39:50.706584 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706591 kernel: CPU17: Booted secondary processor 0x0000040000 [0x413fd0c1] Apr 12 19:39:50.706597 kernel: Detected PIPT I-cache on CPU18 Apr 12 19:39:50.706612 kernel: GICv3: CPU18: found redistributor 0 region 0:0x0000100100140000 Apr 12 19:39:50.706620 kernel: GICv3: CPU18: using allocated LPI pending table @0x00000800008b0000 Apr 12 19:39:50.706627 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706634 kernel: CPU18: Booted secondary processor 0x0000000000 [0x413fd0c1] Apr 12 19:39:50.706640 kernel: Detected PIPT I-cache on CPU19 Apr 12 19:39:50.706647 kernel: GICv3: CPU19: found redistributor 60000 region 0:0x00001001002c0000 Apr 12 19:39:50.706654 kernel: GICv3: CPU19: using allocated LPI pending table @0x00000800008c0000 Apr 12 19:39:50.706661 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706668 kernel: CPU19: Booted secondary processor 0x0000060000 [0x413fd0c1] Apr 12 19:39:50.706676 kernel: Detected PIPT I-cache on CPU20 Apr 12 19:39:50.706682 kernel: GICv3: CPU20: found redistributor 130000 region 0:0x0000100100600000 Apr 12 19:39:50.706691 kernel: GICv3: CPU20: using allocated LPI pending table @0x00000800008d0000 Apr 12 19:39:50.706697 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706704 kernel: CPU20: Booted secondary processor 0x0000130000 [0x413fd0c1] Apr 12 19:39:50.706711 kernel: Detected PIPT I-cache on CPU21 Apr 12 19:39:50.706718 kernel: GICv3: CPU21: found redistributor 1b0000 region 0:0x0000100100800000 Apr 12 19:39:50.706726 kernel: GICv3: CPU21: using allocated LPI pending table @0x00000800008e0000 Apr 12 19:39:50.706734 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706741 kernel: CPU21: Booted secondary processor 0x00001b0000 [0x413fd0c1] Apr 12 19:39:50.706748 kernel: Detected PIPT I-cache on CPU22 Apr 12 19:39:50.706755 kernel: GICv3: CPU22: found redistributor 150000 region 0:0x0000100100680000 Apr 12 19:39:50.706762 kernel: GICv3: CPU22: using allocated LPI pending table @0x00000800008f0000 Apr 12 19:39:50.706769 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706776 kernel: CPU22: Booted secondary processor 0x0000150000 [0x413fd0c1] Apr 12 19:39:50.706783 kernel: Detected PIPT I-cache on CPU23 Apr 12 19:39:50.706790 kernel: GICv3: CPU23: found redistributor 1d0000 region 0:0x0000100100880000 Apr 12 19:39:50.706797 kernel: GICv3: CPU23: using allocated LPI pending table @0x0000080000900000 Apr 12 19:39:50.706804 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706811 kernel: CPU23: Booted secondary processor 0x00001d0000 [0x413fd0c1] Apr 12 19:39:50.706818 kernel: Detected PIPT I-cache on CPU24 Apr 12 19:39:50.706825 kernel: GICv3: CPU24: found redistributor 110000 region 0:0x0000100100580000 Apr 12 19:39:50.706831 kernel: GICv3: CPU24: using allocated LPI pending table @0x0000080000910000 Apr 12 19:39:50.706838 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706845 kernel: CPU24: Booted secondary processor 0x0000110000 [0x413fd0c1] Apr 12 19:39:50.706853 kernel: Detected PIPT I-cache on CPU25 Apr 12 19:39:50.706860 kernel: GICv3: CPU25: found redistributor 190000 region 0:0x0000100100780000 Apr 12 19:39:50.706867 kernel: GICv3: CPU25: using allocated LPI pending table @0x0000080000920000 Apr 12 19:39:50.706874 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706881 kernel: CPU25: Booted secondary processor 0x0000190000 [0x413fd0c1] Apr 12 19:39:50.706887 kernel: Detected PIPT I-cache on CPU26 Apr 12 19:39:50.706894 kernel: GICv3: CPU26: found redistributor 170000 region 0:0x0000100100700000 Apr 12 19:39:50.706901 kernel: GICv3: CPU26: using allocated LPI pending table @0x0000080000930000 Apr 12 19:39:50.706908 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706916 kernel: CPU26: Booted secondary processor 0x0000170000 [0x413fd0c1] Apr 12 19:39:50.706923 kernel: Detected PIPT I-cache on CPU27 Apr 12 19:39:50.706930 kernel: GICv3: CPU27: found redistributor 1f0000 region 0:0x0000100100900000 Apr 12 19:39:50.706936 kernel: GICv3: CPU27: using allocated LPI pending table @0x0000080000940000 Apr 12 19:39:50.706943 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706950 kernel: CPU27: Booted secondary processor 0x00001f0000 [0x413fd0c1] Apr 12 19:39:50.706957 kernel: Detected PIPT I-cache on CPU28 Apr 12 19:39:50.706964 kernel: GICv3: CPU28: found redistributor b0000 region 0:0x0000100100400000 Apr 12 19:39:50.706970 kernel: GICv3: CPU28: using allocated LPI pending table @0x0000080000950000 Apr 12 19:39:50.706977 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.706986 kernel: CPU28: Booted secondary processor 0x00000b0000 [0x413fd0c1] Apr 12 19:39:50.706992 kernel: Detected PIPT I-cache on CPU29 Apr 12 19:39:50.706999 kernel: GICv3: CPU29: found redistributor 230000 region 0:0x0000100100a00000 Apr 12 19:39:50.707006 kernel: GICv3: CPU29: using allocated LPI pending table @0x0000080000960000 Apr 12 19:39:50.707013 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707020 kernel: CPU29: Booted secondary processor 0x0000230000 [0x413fd0c1] Apr 12 19:39:50.707027 kernel: Detected PIPT I-cache on CPU30 Apr 12 19:39:50.707033 kernel: GICv3: CPU30: found redistributor d0000 region 0:0x0000100100480000 Apr 12 19:39:50.707040 kernel: GICv3: CPU30: using allocated LPI pending table @0x0000080000970000 Apr 12 19:39:50.707048 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707055 kernel: CPU30: Booted secondary processor 0x00000d0000 [0x413fd0c1] Apr 12 19:39:50.707062 kernel: Detected PIPT I-cache on CPU31 Apr 12 19:39:50.707069 kernel: GICv3: CPU31: found redistributor 250000 region 0:0x0000100100a80000 Apr 12 19:39:50.707075 kernel: GICv3: CPU31: using allocated LPI pending table @0x0000080000980000 Apr 12 19:39:50.707082 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707089 kernel: CPU31: Booted secondary processor 0x0000250000 [0x413fd0c1] Apr 12 19:39:50.707096 kernel: Detected PIPT I-cache on CPU32 Apr 12 19:39:50.707103 kernel: GICv3: CPU32: found redistributor 90000 region 0:0x0000100100380000 Apr 12 19:39:50.707110 kernel: GICv3: CPU32: using allocated LPI pending table @0x0000080000990000 Apr 12 19:39:50.707118 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707125 kernel: CPU32: Booted secondary processor 0x0000090000 [0x413fd0c1] Apr 12 19:39:50.707131 kernel: Detected PIPT I-cache on CPU33 Apr 12 19:39:50.707138 kernel: GICv3: CPU33: found redistributor 210000 region 0:0x0000100100980000 Apr 12 19:39:50.707145 kernel: GICv3: CPU33: using allocated LPI pending table @0x00000800009a0000 Apr 12 19:39:50.707152 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707159 kernel: CPU33: Booted secondary processor 0x0000210000 [0x413fd0c1] Apr 12 19:39:50.707166 kernel: Detected PIPT I-cache on CPU34 Apr 12 19:39:50.707173 kernel: GICv3: CPU34: found redistributor f0000 region 0:0x0000100100500000 Apr 12 19:39:50.707181 kernel: GICv3: CPU34: using allocated LPI pending table @0x00000800009b0000 Apr 12 19:39:50.707188 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707194 kernel: CPU34: Booted secondary processor 0x00000f0000 [0x413fd0c1] Apr 12 19:39:50.707202 kernel: Detected PIPT I-cache on CPU35 Apr 12 19:39:50.707209 kernel: GICv3: CPU35: found redistributor 270000 region 0:0x0000100100b00000 Apr 12 19:39:50.707216 kernel: GICv3: CPU35: using allocated LPI pending table @0x00000800009c0000 Apr 12 19:39:50.707223 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707230 kernel: CPU35: Booted secondary processor 0x0000270000 [0x413fd0c1] Apr 12 19:39:50.707237 kernel: Detected PIPT I-cache on CPU36 Apr 12 19:39:50.707244 kernel: GICv3: CPU36: found redistributor 30000 region 0:0x0000100100200000 Apr 12 19:39:50.707252 kernel: GICv3: CPU36: using allocated LPI pending table @0x00000800009d0000 Apr 12 19:39:50.707259 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707265 kernel: CPU36: Booted secondary processor 0x0000030000 [0x413fd0c1] Apr 12 19:39:50.707272 kernel: Detected PIPT I-cache on CPU37 Apr 12 19:39:50.707279 kernel: GICv3: CPU37: found redistributor 50000 region 0:0x0000100100280000 Apr 12 19:39:50.707286 kernel: GICv3: CPU37: using allocated LPI pending table @0x00000800009e0000 Apr 12 19:39:50.707293 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707301 kernel: CPU37: Booted secondary processor 0x0000050000 [0x413fd0c1] Apr 12 19:39:50.707308 kernel: Detected PIPT I-cache on CPU38 Apr 12 19:39:50.707316 kernel: GICv3: CPU38: found redistributor 10000 region 0:0x0000100100180000 Apr 12 19:39:50.707323 kernel: GICv3: CPU38: using allocated LPI pending table @0x00000800009f0000 Apr 12 19:39:50.707330 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707337 kernel: CPU38: Booted secondary processor 0x0000010000 [0x413fd0c1] Apr 12 19:39:50.707344 kernel: Detected PIPT I-cache on CPU39 Apr 12 19:39:50.707351 kernel: GICv3: CPU39: found redistributor 70000 region 0:0x0000100100300000 Apr 12 19:39:50.707358 kernel: GICv3: CPU39: using allocated LPI pending table @0x0000080000a00000 Apr 12 19:39:50.707365 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707371 kernel: CPU39: Booted secondary processor 0x0000070000 [0x413fd0c1] Apr 12 19:39:50.707379 kernel: Detected PIPT I-cache on CPU40 Apr 12 19:39:50.707386 kernel: GICv3: CPU40: found redistributor 120100 region 0:0x00001001005e0000 Apr 12 19:39:50.707393 kernel: GICv3: CPU40: using allocated LPI pending table @0x0000080000a10000 Apr 12 19:39:50.707400 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707407 kernel: CPU40: Booted secondary processor 0x0000120100 [0x413fd0c1] Apr 12 19:39:50.707414 kernel: Detected PIPT I-cache on CPU41 Apr 12 19:39:50.707420 kernel: GICv3: CPU41: found redistributor 1a0100 region 0:0x00001001007e0000 Apr 12 19:39:50.707427 kernel: GICv3: CPU41: using allocated LPI pending table @0x0000080000a20000 Apr 12 19:39:50.707435 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707442 kernel: CPU41: Booted secondary processor 0x00001a0100 [0x413fd0c1] Apr 12 19:39:50.707449 kernel: Detected PIPT I-cache on CPU42 Apr 12 19:39:50.707456 kernel: GICv3: CPU42: found redistributor 140100 region 0:0x0000100100660000 Apr 12 19:39:50.707463 kernel: GICv3: CPU42: using allocated LPI pending table @0x0000080000a30000 Apr 12 19:39:50.707469 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707476 kernel: CPU42: Booted secondary processor 0x0000140100 [0x413fd0c1] Apr 12 19:39:50.707483 kernel: Detected PIPT I-cache on CPU43 Apr 12 19:39:50.707490 kernel: GICv3: CPU43: found redistributor 1c0100 region 0:0x0000100100860000 Apr 12 19:39:50.707497 kernel: GICv3: CPU43: using allocated LPI pending table @0x0000080000a40000 Apr 12 19:39:50.707505 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707512 kernel: CPU43: Booted secondary processor 0x00001c0100 [0x413fd0c1] Apr 12 19:39:50.707518 kernel: Detected PIPT I-cache on CPU44 Apr 12 19:39:50.707525 kernel: GICv3: CPU44: found redistributor 100100 region 0:0x0000100100560000 Apr 12 19:39:50.707532 kernel: GICv3: CPU44: using allocated LPI pending table @0x0000080000a50000 Apr 12 19:39:50.707539 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707546 kernel: CPU44: Booted secondary processor 0x0000100100 [0x413fd0c1] Apr 12 19:39:50.707553 kernel: Detected PIPT I-cache on CPU45 Apr 12 19:39:50.707559 kernel: GICv3: CPU45: found redistributor 180100 region 0:0x0000100100760000 Apr 12 19:39:50.707568 kernel: GICv3: CPU45: using allocated LPI pending table @0x0000080000a60000 Apr 12 19:39:50.707574 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707582 kernel: CPU45: Booted secondary processor 0x0000180100 [0x413fd0c1] Apr 12 19:39:50.707589 kernel: Detected PIPT I-cache on CPU46 Apr 12 19:39:50.707595 kernel: GICv3: CPU46: found redistributor 160100 region 0:0x00001001006e0000 Apr 12 19:39:50.707602 kernel: GICv3: CPU46: using allocated LPI pending table @0x0000080000a70000 Apr 12 19:39:50.707609 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707617 kernel: CPU46: Booted secondary processor 0x0000160100 [0x413fd0c1] Apr 12 19:39:50.707624 kernel: Detected PIPT I-cache on CPU47 Apr 12 19:39:50.707631 kernel: GICv3: CPU47: found redistributor 1e0100 region 0:0x00001001008e0000 Apr 12 19:39:50.707639 kernel: GICv3: CPU47: using allocated LPI pending table @0x0000080000a80000 Apr 12 19:39:50.707646 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707652 kernel: CPU47: Booted secondary processor 0x00001e0100 [0x413fd0c1] Apr 12 19:39:50.707659 kernel: Detected PIPT I-cache on CPU48 Apr 12 19:39:50.707666 kernel: GICv3: CPU48: found redistributor a0100 region 0:0x00001001003e0000 Apr 12 19:39:50.707673 kernel: GICv3: CPU48: using allocated LPI pending table @0x0000080000a90000 Apr 12 19:39:50.707680 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707687 kernel: CPU48: Booted secondary processor 0x00000a0100 [0x413fd0c1] Apr 12 19:39:50.707694 kernel: Detected PIPT I-cache on CPU49 Apr 12 19:39:50.707702 kernel: GICv3: CPU49: found redistributor 220100 region 0:0x00001001009e0000 Apr 12 19:39:50.707709 kernel: GICv3: CPU49: using allocated LPI pending table @0x0000080000aa0000 Apr 12 19:39:50.707715 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707722 kernel: CPU49: Booted secondary processor 0x0000220100 [0x413fd0c1] Apr 12 19:39:50.707729 kernel: Detected PIPT I-cache on CPU50 Apr 12 19:39:50.707736 kernel: GICv3: CPU50: found redistributor c0100 region 0:0x0000100100460000 Apr 12 19:39:50.707743 kernel: GICv3: CPU50: using allocated LPI pending table @0x0000080000ab0000 Apr 12 19:39:50.707750 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707757 kernel: CPU50: Booted secondary processor 0x00000c0100 [0x413fd0c1] Apr 12 19:39:50.707764 kernel: Detected PIPT I-cache on CPU51 Apr 12 19:39:50.707772 kernel: GICv3: CPU51: found redistributor 240100 region 0:0x0000100100a60000 Apr 12 19:39:50.707779 kernel: GICv3: CPU51: using allocated LPI pending table @0x0000080000ac0000 Apr 12 19:39:50.707786 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707792 kernel: CPU51: Booted secondary processor 0x0000240100 [0x413fd0c1] Apr 12 19:39:50.707799 kernel: Detected PIPT I-cache on CPU52 Apr 12 19:39:50.707806 kernel: GICv3: CPU52: found redistributor 80100 region 0:0x0000100100360000 Apr 12 19:39:50.707813 kernel: GICv3: CPU52: using allocated LPI pending table @0x0000080000ad0000 Apr 12 19:39:50.707820 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707827 kernel: CPU52: Booted secondary processor 0x0000080100 [0x413fd0c1] Apr 12 19:39:50.707835 kernel: Detected PIPT I-cache on CPU53 Apr 12 19:39:50.707842 kernel: GICv3: CPU53: found redistributor 200100 region 0:0x0000100100960000 Apr 12 19:39:50.707848 kernel: GICv3: CPU53: using allocated LPI pending table @0x0000080000ae0000 Apr 12 19:39:50.707856 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707863 kernel: CPU53: Booted secondary processor 0x0000200100 [0x413fd0c1] Apr 12 19:39:50.707870 kernel: Detected PIPT I-cache on CPU54 Apr 12 19:39:50.707877 kernel: GICv3: CPU54: found redistributor e0100 region 0:0x00001001004e0000 Apr 12 19:39:50.707884 kernel: GICv3: CPU54: using allocated LPI pending table @0x0000080000af0000 Apr 12 19:39:50.707891 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707898 kernel: CPU54: Booted secondary processor 0x00000e0100 [0x413fd0c1] Apr 12 19:39:50.707906 kernel: Detected PIPT I-cache on CPU55 Apr 12 19:39:50.707913 kernel: GICv3: CPU55: found redistributor 260100 region 0:0x0000100100ae0000 Apr 12 19:39:50.707920 kernel: GICv3: CPU55: using allocated LPI pending table @0x0000080000b00000 Apr 12 19:39:50.707927 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707934 kernel: CPU55: Booted secondary processor 0x0000260100 [0x413fd0c1] Apr 12 19:39:50.707940 kernel: Detected PIPT I-cache on CPU56 Apr 12 19:39:50.707947 kernel: GICv3: CPU56: found redistributor 20100 region 0:0x00001001001e0000 Apr 12 19:39:50.707954 kernel: GICv3: CPU56: using allocated LPI pending table @0x0000080000b10000 Apr 12 19:39:50.707961 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.707969 kernel: CPU56: Booted secondary processor 0x0000020100 [0x413fd0c1] Apr 12 19:39:50.707976 kernel: Detected PIPT I-cache on CPU57 Apr 12 19:39:50.707982 kernel: GICv3: CPU57: found redistributor 40100 region 0:0x0000100100260000 Apr 12 19:39:50.707989 kernel: GICv3: CPU57: using allocated LPI pending table @0x0000080000b20000 Apr 12 19:39:50.707996 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708003 kernel: CPU57: Booted secondary processor 0x0000040100 [0x413fd0c1] Apr 12 19:39:50.708010 kernel: Detected PIPT I-cache on CPU58 Apr 12 19:39:50.708016 kernel: GICv3: CPU58: found redistributor 100 region 0:0x0000100100160000 Apr 12 19:39:50.708023 kernel: GICv3: CPU58: using allocated LPI pending table @0x0000080000b30000 Apr 12 19:39:50.708031 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708038 kernel: CPU58: Booted secondary processor 0x0000000100 [0x413fd0c1] Apr 12 19:39:50.708045 kernel: Detected PIPT I-cache on CPU59 Apr 12 19:39:50.708052 kernel: GICv3: CPU59: found redistributor 60100 region 0:0x00001001002e0000 Apr 12 19:39:50.708059 kernel: GICv3: CPU59: using allocated LPI pending table @0x0000080000b40000 Apr 12 19:39:50.708066 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708073 kernel: CPU59: Booted secondary processor 0x0000060100 [0x413fd0c1] Apr 12 19:39:50.708079 kernel: Detected PIPT I-cache on CPU60 Apr 12 19:39:50.708086 kernel: GICv3: CPU60: found redistributor 130100 region 0:0x0000100100620000 Apr 12 19:39:50.708093 kernel: GICv3: CPU60: using allocated LPI pending table @0x0000080000b50000 Apr 12 19:39:50.708101 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708108 kernel: CPU60: Booted secondary processor 0x0000130100 [0x413fd0c1] Apr 12 19:39:50.708115 kernel: Detected PIPT I-cache on CPU61 Apr 12 19:39:50.708122 kernel: GICv3: CPU61: found redistributor 1b0100 region 0:0x0000100100820000 Apr 12 19:39:50.708128 kernel: GICv3: CPU61: using allocated LPI pending table @0x0000080000b60000 Apr 12 19:39:50.708135 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708142 kernel: CPU61: Booted secondary processor 0x00001b0100 [0x413fd0c1] Apr 12 19:39:50.708149 kernel: Detected PIPT I-cache on CPU62 Apr 12 19:39:50.708156 kernel: GICv3: CPU62: found redistributor 150100 region 0:0x00001001006a0000 Apr 12 19:39:50.708164 kernel: GICv3: CPU62: using allocated LPI pending table @0x0000080000b70000 Apr 12 19:39:50.708171 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708177 kernel: CPU62: Booted secondary processor 0x0000150100 [0x413fd0c1] Apr 12 19:39:50.708184 kernel: Detected PIPT I-cache on CPU63 Apr 12 19:39:50.708191 kernel: GICv3: CPU63: found redistributor 1d0100 region 0:0x00001001008a0000 Apr 12 19:39:50.708198 kernel: GICv3: CPU63: using allocated LPI pending table @0x0000080000b80000 Apr 12 19:39:50.708205 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708211 kernel: CPU63: Booted secondary processor 0x00001d0100 [0x413fd0c1] Apr 12 19:39:50.708218 kernel: Detected PIPT I-cache on CPU64 Apr 12 19:39:50.708225 kernel: GICv3: CPU64: found redistributor 110100 region 0:0x00001001005a0000 Apr 12 19:39:50.708233 kernel: GICv3: CPU64: using allocated LPI pending table @0x0000080000b90000 Apr 12 19:39:50.708240 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708247 kernel: CPU64: Booted secondary processor 0x0000110100 [0x413fd0c1] Apr 12 19:39:50.708254 kernel: Detected PIPT I-cache on CPU65 Apr 12 19:39:50.708260 kernel: GICv3: CPU65: found redistributor 190100 region 0:0x00001001007a0000 Apr 12 19:39:50.708267 kernel: GICv3: CPU65: using allocated LPI pending table @0x0000080000ba0000 Apr 12 19:39:50.708274 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708281 kernel: CPU65: Booted secondary processor 0x0000190100 [0x413fd0c1] Apr 12 19:39:50.708288 kernel: Detected PIPT I-cache on CPU66 Apr 12 19:39:50.708298 kernel: GICv3: CPU66: found redistributor 170100 region 0:0x0000100100720000 Apr 12 19:39:50.708305 kernel: GICv3: CPU66: using allocated LPI pending table @0x0000080000bb0000 Apr 12 19:39:50.708312 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708318 kernel: CPU66: Booted secondary processor 0x0000170100 [0x413fd0c1] Apr 12 19:39:50.708325 kernel: Detected PIPT I-cache on CPU67 Apr 12 19:39:50.708332 kernel: GICv3: CPU67: found redistributor 1f0100 region 0:0x0000100100920000 Apr 12 19:39:50.708339 kernel: GICv3: CPU67: using allocated LPI pending table @0x0000080000bc0000 Apr 12 19:39:50.708346 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708353 kernel: CPU67: Booted secondary processor 0x00001f0100 [0x413fd0c1] Apr 12 19:39:50.708360 kernel: Detected PIPT I-cache on CPU68 Apr 12 19:39:50.708368 kernel: GICv3: CPU68: found redistributor b0100 region 0:0x0000100100420000 Apr 12 19:39:50.708375 kernel: GICv3: CPU68: using allocated LPI pending table @0x0000080000bd0000 Apr 12 19:39:50.708382 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708389 kernel: CPU68: Booted secondary processor 0x00000b0100 [0x413fd0c1] Apr 12 19:39:50.708395 kernel: Detected PIPT I-cache on CPU69 Apr 12 19:39:50.708402 kernel: GICv3: CPU69: found redistributor 230100 region 0:0x0000100100a20000 Apr 12 19:39:50.708409 kernel: GICv3: CPU69: using allocated LPI pending table @0x0000080000be0000 Apr 12 19:39:50.708416 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708423 kernel: CPU69: Booted secondary processor 0x0000230100 [0x413fd0c1] Apr 12 19:39:50.708431 kernel: Detected PIPT I-cache on CPU70 Apr 12 19:39:50.708438 kernel: GICv3: CPU70: found redistributor d0100 region 0:0x00001001004a0000 Apr 12 19:39:50.708444 kernel: GICv3: CPU70: using allocated LPI pending table @0x0000080000bf0000 Apr 12 19:39:50.708451 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708458 kernel: CPU70: Booted secondary processor 0x00000d0100 [0x413fd0c1] Apr 12 19:39:50.708465 kernel: Detected PIPT I-cache on CPU71 Apr 12 19:39:50.708472 kernel: GICv3: CPU71: found redistributor 250100 region 0:0x0000100100aa0000 Apr 12 19:39:50.708479 kernel: GICv3: CPU71: using allocated LPI pending table @0x0000080000c00000 Apr 12 19:39:50.708485 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708492 kernel: CPU71: Booted secondary processor 0x0000250100 [0x413fd0c1] Apr 12 19:39:50.708500 kernel: Detected PIPT I-cache on CPU72 Apr 12 19:39:50.708507 kernel: GICv3: CPU72: found redistributor 90100 region 0:0x00001001003a0000 Apr 12 19:39:50.708514 kernel: GICv3: CPU72: using allocated LPI pending table @0x0000080000c10000 Apr 12 19:39:50.708521 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708528 kernel: CPU72: Booted secondary processor 0x0000090100 [0x413fd0c1] Apr 12 19:39:50.708534 kernel: Detected PIPT I-cache on CPU73 Apr 12 19:39:50.708541 kernel: GICv3: CPU73: found redistributor 210100 region 0:0x00001001009a0000 Apr 12 19:39:50.708548 kernel: GICv3: CPU73: using allocated LPI pending table @0x0000080000c20000 Apr 12 19:39:50.708555 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708563 kernel: CPU73: Booted secondary processor 0x0000210100 [0x413fd0c1] Apr 12 19:39:50.708570 kernel: Detected PIPT I-cache on CPU74 Apr 12 19:39:50.708577 kernel: GICv3: CPU74: found redistributor f0100 region 0:0x0000100100520000 Apr 12 19:39:50.708583 kernel: GICv3: CPU74: using allocated LPI pending table @0x0000080000c30000 Apr 12 19:39:50.708590 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708597 kernel: CPU74: Booted secondary processor 0x00000f0100 [0x413fd0c1] Apr 12 19:39:50.708604 kernel: Detected PIPT I-cache on CPU75 Apr 12 19:39:50.708611 kernel: GICv3: CPU75: found redistributor 270100 region 0:0x0000100100b20000 Apr 12 19:39:50.708618 kernel: GICv3: CPU75: using allocated LPI pending table @0x0000080000c40000 Apr 12 19:39:50.708626 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708633 kernel: CPU75: Booted secondary processor 0x0000270100 [0x413fd0c1] Apr 12 19:39:50.708639 kernel: Detected PIPT I-cache on CPU76 Apr 12 19:39:50.708646 kernel: GICv3: CPU76: found redistributor 30100 region 0:0x0000100100220000 Apr 12 19:39:50.708653 kernel: GICv3: CPU76: using allocated LPI pending table @0x0000080000c50000 Apr 12 19:39:50.708660 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708667 kernel: CPU76: Booted secondary processor 0x0000030100 [0x413fd0c1] Apr 12 19:39:50.708674 kernel: Detected PIPT I-cache on CPU77 Apr 12 19:39:50.708681 kernel: GICv3: CPU77: found redistributor 50100 region 0:0x00001001002a0000 Apr 12 19:39:50.708687 kernel: GICv3: CPU77: using allocated LPI pending table @0x0000080000c60000 Apr 12 19:39:50.708695 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708702 kernel: CPU77: Booted secondary processor 0x0000050100 [0x413fd0c1] Apr 12 19:39:50.708709 kernel: Detected PIPT I-cache on CPU78 Apr 12 19:39:50.708716 kernel: GICv3: CPU78: found redistributor 10100 region 0:0x00001001001a0000 Apr 12 19:39:50.708723 kernel: GICv3: CPU78: using allocated LPI pending table @0x0000080000c70000 Apr 12 19:39:50.708730 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708737 kernel: CPU78: Booted secondary processor 0x0000010100 [0x413fd0c1] Apr 12 19:39:50.708744 kernel: Detected PIPT I-cache on CPU79 Apr 12 19:39:50.708750 kernel: GICv3: CPU79: found redistributor 70100 region 0:0x0000100100320000 Apr 12 19:39:50.708758 kernel: GICv3: CPU79: using allocated LPI pending table @0x0000080000c80000 Apr 12 19:39:50.708765 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:39:50.708772 kernel: CPU79: Booted secondary processor 0x0000070100 [0x413fd0c1] Apr 12 19:39:50.708779 kernel: smp: Brought up 1 node, 80 CPUs Apr 12 19:39:50.708786 kernel: SMP: Total of 80 processors activated. Apr 12 19:39:50.708793 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 19:39:50.708800 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 19:39:50.708806 kernel: CPU features: detected: Common not Private translations Apr 12 19:39:50.708813 kernel: CPU features: detected: CRC32 instructions Apr 12 19:39:50.708820 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 19:39:50.708828 kernel: CPU features: detected: LSE atomic instructions Apr 12 19:39:50.708835 kernel: CPU features: detected: Privileged Access Never Apr 12 19:39:50.708842 kernel: CPU features: detected: RAS Extension Support Apr 12 19:39:50.708849 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 19:39:50.708856 kernel: CPU: All CPU(s) started at EL2 Apr 12 19:39:50.708863 kernel: devtmpfs: initialized Apr 12 19:39:50.708870 kernel: KASLR enabled Apr 12 19:39:50.708877 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 19:39:50.708884 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Apr 12 19:39:50.708892 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 19:39:50.708899 kernel: SMBIOS 3.4.0 present. Apr 12 19:39:50.708905 kernel: DMI: GIGABYTE R272-P30-JG/MP32-AR0-JG, BIOS F17a (SCP: 1.07.20210713) 07/22/2021 Apr 12 19:39:50.708912 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 19:39:50.708919 kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations Apr 12 19:39:50.708926 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 19:39:50.708933 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 19:39:50.708940 kernel: audit: initializing netlink subsys (disabled) Apr 12 19:39:50.708947 kernel: audit: type=2000 audit(0.053:1): state=initialized audit_enabled=0 res=1 Apr 12 19:39:50.708955 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 19:39:50.708962 kernel: cpuidle: using governor menu Apr 12 19:39:50.708969 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 19:39:50.708976 kernel: ASID allocator initialised with 32768 entries Apr 12 19:39:50.708983 kernel: ACPI: bus type PCI registered Apr 12 19:39:50.708989 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 19:39:50.708996 kernel: Serial: AMBA PL011 UART driver Apr 12 19:39:50.709003 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 19:39:50.709010 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 19:39:50.709018 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 19:39:50.709025 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 19:39:50.709032 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 19:39:50.709039 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 19:39:50.709046 kernel: ACPI: Added _OSI(Module Device) Apr 12 19:39:50.709053 kernel: ACPI: Added _OSI(Processor Device) Apr 12 19:39:50.709059 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 19:39:50.709066 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 19:39:50.709073 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 19:39:50.709081 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 19:39:50.709088 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 19:39:50.709095 kernel: ACPI: 2 ACPI AML tables successfully acquired and loaded Apr 12 19:39:50.709102 kernel: ACPI: Interpreter enabled Apr 12 19:39:50.709108 kernel: ACPI: Using GIC for interrupt routing Apr 12 19:39:50.709115 kernel: ACPI: MCFG table detected, 8 entries Apr 12 19:39:50.709122 kernel: ACPI: IORT: SMMU-v3[33ffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709129 kernel: ACPI: IORT: SMMU-v3[37ffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709136 kernel: ACPI: IORT: SMMU-v3[3bffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709144 kernel: ACPI: IORT: SMMU-v3[3fffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709151 kernel: ACPI: IORT: SMMU-v3[23ffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709157 kernel: ACPI: IORT: SMMU-v3[27ffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709164 kernel: ACPI: IORT: SMMU-v3[2bffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709171 kernel: ACPI: IORT: SMMU-v3[2fffe0000000] Mapped to Proximity domain 0 Apr 12 19:39:50.709178 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x100002600000 (irq = 19, base_baud = 0) is a SBSA Apr 12 19:39:50.709185 kernel: printk: console [ttyAMA0] enabled Apr 12 19:39:50.709192 kernel: ARMH0011:01: ttyAMA1 at MMIO 0x100002620000 (irq = 20, base_baud = 0) is a SBSA Apr 12 19:39:50.709199 kernel: ACPI: PCI Root Bridge [PCI1] (domain 000d [bus 00-ff]) Apr 12 19:39:50.709320 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.709387 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.709446 kernel: acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.709505 kernel: acpi PNP0A08:00: MCFG quirk: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.709563 kernel: acpi PNP0A08:00: ECAM area [mem 0x37fff0000000-0x37ffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.709621 kernel: acpi PNP0A08:00: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] Apr 12 19:39:50.709632 kernel: PCI host bridge to bus 000d:00 Apr 12 19:39:50.709697 kernel: pci_bus 000d:00: root bus resource [mem 0x50000000-0x5fffffff window] Apr 12 19:39:50.709752 kernel: pci_bus 000d:00: root bus resource [mem 0x340000000000-0x37ffdfffffff window] Apr 12 19:39:50.709805 kernel: pci_bus 000d:00: root bus resource [bus 00-ff] Apr 12 19:39:50.709877 kernel: pci 000d:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:39:50.709948 kernel: pci 000d:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:39:50.710011 kernel: pci 000d:00:01.0: enabling Extended Tags Apr 12 19:39:50.710071 kernel: pci 000d:00:01.0: supports D1 D2 Apr 12 19:39:50.710130 kernel: pci 000d:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.710198 kernel: pci 000d:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:39:50.710258 kernel: pci 000d:00:02.0: supports D1 D2 Apr 12 19:39:50.710322 kernel: pci 000d:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.710389 kernel: pci 000d:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:39:50.710451 kernel: pci 000d:00:03.0: supports D1 D2 Apr 12 19:39:50.710511 kernel: pci 000d:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.710578 kernel: pci 000d:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:39:50.710639 kernel: pci 000d:00:04.0: supports D1 D2 Apr 12 19:39:50.710698 kernel: pci 000d:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.710707 kernel: acpiphp: Slot [1] registered Apr 12 19:39:50.710714 kernel: acpiphp: Slot [2] registered Apr 12 19:39:50.710722 kernel: acpiphp: Slot [3] registered Apr 12 19:39:50.710729 kernel: acpiphp: Slot [4] registered Apr 12 19:39:50.710781 kernel: pci_bus 000d:00: on NUMA node 0 Apr 12 19:39:50.710841 kernel: pci 000d:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.710900 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.710960 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.711020 kernel: pci 000d:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.711080 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.711140 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.711201 kernel: pci 000d:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.711259 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.711321 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.711390 kernel: pci 000d:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.711449 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.711510 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.711575 kernel: pci 000d:00:01.0: BAR 14: assigned [mem 0x50000000-0x501fffff] Apr 12 19:39:50.711637 kernel: pci 000d:00:01.0: BAR 15: assigned [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 19:39:50.711699 kernel: pci 000d:00:02.0: BAR 14: assigned [mem 0x50200000-0x503fffff] Apr 12 19:39:50.711761 kernel: pci 000d:00:02.0: BAR 15: assigned [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 19:39:50.711821 kernel: pci 000d:00:03.0: BAR 14: assigned [mem 0x50400000-0x505fffff] Apr 12 19:39:50.711880 kernel: pci 000d:00:03.0: BAR 15: assigned [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 19:39:50.711941 kernel: pci 000d:00:04.0: BAR 14: assigned [mem 0x50600000-0x507fffff] Apr 12 19:39:50.712002 kernel: pci 000d:00:04.0: BAR 15: assigned [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 19:39:50.712104 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712166 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712227 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712287 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712358 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712419 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712480 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712544 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712603 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712662 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712722 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712781 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712843 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.712907 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.712972 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.713032 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.713090 kernel: pci 000d:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.713152 kernel: pci 000d:00:01.0: bridge window [mem 0x50000000-0x501fffff] Apr 12 19:39:50.713211 kernel: pci 000d:00:01.0: bridge window [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 19:39:50.713271 kernel: pci 000d:00:02.0: PCI bridge to [bus 02] Apr 12 19:39:50.713334 kernel: pci 000d:00:02.0: bridge window [mem 0x50200000-0x503fffff] Apr 12 19:39:50.713395 kernel: pci 000d:00:02.0: bridge window [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 19:39:50.713456 kernel: pci 000d:00:03.0: PCI bridge to [bus 03] Apr 12 19:39:50.713516 kernel: pci 000d:00:03.0: bridge window [mem 0x50400000-0x505fffff] Apr 12 19:39:50.713576 kernel: pci 000d:00:03.0: bridge window [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 19:39:50.713634 kernel: pci 000d:00:04.0: PCI bridge to [bus 04] Apr 12 19:39:50.713694 kernel: pci 000d:00:04.0: bridge window [mem 0x50600000-0x507fffff] Apr 12 19:39:50.713753 kernel: pci 000d:00:04.0: bridge window [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 19:39:50.713811 kernel: pci_bus 000d:00: resource 4 [mem 0x50000000-0x5fffffff window] Apr 12 19:39:50.713863 kernel: pci_bus 000d:00: resource 5 [mem 0x340000000000-0x37ffdfffffff window] Apr 12 19:39:50.713931 kernel: pci_bus 000d:01: resource 1 [mem 0x50000000-0x501fffff] Apr 12 19:39:50.713987 kernel: pci_bus 000d:01: resource 2 [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 19:39:50.714052 kernel: pci_bus 000d:02: resource 1 [mem 0x50200000-0x503fffff] Apr 12 19:39:50.714109 kernel: pci_bus 000d:02: resource 2 [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 19:39:50.714181 kernel: pci_bus 000d:03: resource 1 [mem 0x50400000-0x505fffff] Apr 12 19:39:50.714239 kernel: pci_bus 000d:03: resource 2 [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 19:39:50.714307 kernel: pci_bus 000d:04: resource 1 [mem 0x50600000-0x507fffff] Apr 12 19:39:50.714366 kernel: pci_bus 000d:04: resource 2 [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 19:39:50.714375 kernel: ACPI: PCI Root Bridge [PCI3] (domain 0000 [bus 00-ff]) Apr 12 19:39:50.714441 kernel: acpi PNP0A08:01: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.714503 kernel: acpi PNP0A08:01: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.714560 kernel: acpi PNP0A08:01: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.714617 kernel: acpi PNP0A08:01: MCFG quirk: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.714675 kernel: acpi PNP0A08:01: ECAM area [mem 0x3ffff0000000-0x3fffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.714732 kernel: acpi PNP0A08:01: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] Apr 12 19:39:50.714741 kernel: PCI host bridge to bus 0000:00 Apr 12 19:39:50.714803 kernel: pci_bus 0000:00: root bus resource [mem 0x70000000-0x7fffffff window] Apr 12 19:39:50.714861 kernel: pci_bus 0000:00: root bus resource [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 19:39:50.714915 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 19:39:50.714982 kernel: pci 0000:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:39:50.715051 kernel: pci 0000:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:39:50.715111 kernel: pci 0000:00:01.0: enabling Extended Tags Apr 12 19:39:50.715170 kernel: pci 0000:00:01.0: supports D1 D2 Apr 12 19:39:50.715231 kernel: pci 0000:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.715301 kernel: pci 0000:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:39:50.715364 kernel: pci 0000:00:02.0: supports D1 D2 Apr 12 19:39:50.715424 kernel: pci 0000:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.715491 kernel: pci 0000:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:39:50.715551 kernel: pci 0000:00:03.0: supports D1 D2 Apr 12 19:39:50.715610 kernel: pci 0000:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.715676 kernel: pci 0000:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:39:50.715738 kernel: pci 0000:00:04.0: supports D1 D2 Apr 12 19:39:50.715797 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.715806 kernel: acpiphp: Slot [1-1] registered Apr 12 19:39:50.715813 kernel: acpiphp: Slot [2-1] registered Apr 12 19:39:50.715820 kernel: acpiphp: Slot [3-1] registered Apr 12 19:39:50.715826 kernel: acpiphp: Slot [4-1] registered Apr 12 19:39:50.715878 kernel: pci_bus 0000:00: on NUMA node 0 Apr 12 19:39:50.715941 kernel: pci 0000:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.716001 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.716082 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.716150 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.716209 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.716270 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.716350 kernel: pci 0000:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.716428 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.716491 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.716550 kernel: pci 0000:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.716609 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.716669 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.716729 kernel: pci 0000:00:01.0: BAR 14: assigned [mem 0x70000000-0x701fffff] Apr 12 19:39:50.716790 kernel: pci 0000:00:01.0: BAR 15: assigned [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 19:39:50.716850 kernel: pci 0000:00:02.0: BAR 14: assigned [mem 0x70200000-0x703fffff] Apr 12 19:39:50.716912 kernel: pci 0000:00:02.0: BAR 15: assigned [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 19:39:50.716972 kernel: pci 0000:00:03.0: BAR 14: assigned [mem 0x70400000-0x705fffff] Apr 12 19:39:50.717031 kernel: pci 0000:00:03.0: BAR 15: assigned [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 19:39:50.717092 kernel: pci 0000:00:04.0: BAR 14: assigned [mem 0x70600000-0x707fffff] Apr 12 19:39:50.717151 kernel: pci 0000:00:04.0: BAR 15: assigned [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 19:39:50.717211 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717271 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.717335 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717396 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.717454 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717516 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.717575 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717635 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.717696 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717756 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.717815 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717876 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.717935 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.717996 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.718056 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.718115 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.718175 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.718234 kernel: pci 0000:00:01.0: bridge window [mem 0x70000000-0x701fffff] Apr 12 19:39:50.718297 kernel: pci 0000:00:01.0: bridge window [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 19:39:50.718359 kernel: pci 0000:00:02.0: PCI bridge to [bus 02] Apr 12 19:39:50.718419 kernel: pci 0000:00:02.0: bridge window [mem 0x70200000-0x703fffff] Apr 12 19:39:50.718479 kernel: pci 0000:00:02.0: bridge window [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 19:39:50.718538 kernel: pci 0000:00:03.0: PCI bridge to [bus 03] Apr 12 19:39:50.718600 kernel: pci 0000:00:03.0: bridge window [mem 0x70400000-0x705fffff] Apr 12 19:39:50.718659 kernel: pci 0000:00:03.0: bridge window [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 19:39:50.718721 kernel: pci 0000:00:04.0: PCI bridge to [bus 04] Apr 12 19:39:50.718780 kernel: pci 0000:00:04.0: bridge window [mem 0x70600000-0x707fffff] Apr 12 19:39:50.718840 kernel: pci 0000:00:04.0: bridge window [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 19:39:50.718894 kernel: pci_bus 0000:00: resource 4 [mem 0x70000000-0x7fffffff window] Apr 12 19:39:50.718948 kernel: pci_bus 0000:00: resource 5 [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 19:39:50.719014 kernel: pci_bus 0000:01: resource 1 [mem 0x70000000-0x701fffff] Apr 12 19:39:50.719070 kernel: pci_bus 0000:01: resource 2 [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 19:39:50.719135 kernel: pci_bus 0000:02: resource 1 [mem 0x70200000-0x703fffff] Apr 12 19:39:50.719190 kernel: pci_bus 0000:02: resource 2 [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 19:39:50.719263 kernel: pci_bus 0000:03: resource 1 [mem 0x70400000-0x705fffff] Apr 12 19:39:50.719325 kernel: pci_bus 0000:03: resource 2 [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 19:39:50.719388 kernel: pci_bus 0000:04: resource 1 [mem 0x70600000-0x707fffff] Apr 12 19:39:50.719445 kernel: pci_bus 0000:04: resource 2 [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 19:39:50.719454 kernel: ACPI: PCI Root Bridge [PCI7] (domain 0005 [bus 00-ff]) Apr 12 19:39:50.719518 kernel: acpi PNP0A08:02: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.719577 kernel: acpi PNP0A08:02: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.719636 kernel: acpi PNP0A08:02: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.719694 kernel: acpi PNP0A08:02: MCFG quirk: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.719751 kernel: acpi PNP0A08:02: ECAM area [mem 0x2ffff0000000-0x2fffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.719809 kernel: acpi PNP0A08:02: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] Apr 12 19:39:50.719818 kernel: PCI host bridge to bus 0005:00 Apr 12 19:39:50.719879 kernel: pci_bus 0005:00: root bus resource [mem 0x30000000-0x3fffffff window] Apr 12 19:39:50.719934 kernel: pci_bus 0005:00: root bus resource [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 19:39:50.719988 kernel: pci_bus 0005:00: root bus resource [bus 00-ff] Apr 12 19:39:50.720055 kernel: pci 0005:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:39:50.720123 kernel: pci 0005:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:39:50.720183 kernel: pci 0005:00:01.0: supports D1 D2 Apr 12 19:39:50.720243 kernel: pci 0005:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.720312 kernel: pci 0005:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:39:50.720374 kernel: pci 0005:00:03.0: supports D1 D2 Apr 12 19:39:50.720434 kernel: pci 0005:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.720499 kernel: pci 0005:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:39:50.720560 kernel: pci 0005:00:05.0: supports D1 D2 Apr 12 19:39:50.720619 kernel: pci 0005:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.720685 kernel: pci 0005:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 19:39:50.720745 kernel: pci 0005:00:07.0: supports D1 D2 Apr 12 19:39:50.720805 kernel: pci 0005:00:07.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.720816 kernel: acpiphp: Slot [1-2] registered Apr 12 19:39:50.720823 kernel: acpiphp: Slot [2-2] registered Apr 12 19:39:50.720890 kernel: pci 0005:03:00.0: [144d:a808] type 00 class 0x010802 Apr 12 19:39:50.720953 kernel: pci 0005:03:00.0: reg 0x10: [mem 0x30110000-0x30113fff 64bit] Apr 12 19:39:50.721015 kernel: pci 0005:03:00.0: reg 0x30: [mem 0x30100000-0x3010ffff pref] Apr 12 19:39:50.721083 kernel: pci 0005:04:00.0: [144d:a808] type 00 class 0x010802 Apr 12 19:39:50.721146 kernel: pci 0005:04:00.0: reg 0x10: [mem 0x30010000-0x30013fff 64bit] Apr 12 19:39:50.721210 kernel: pci 0005:04:00.0: reg 0x30: [mem 0x30000000-0x3000ffff pref] Apr 12 19:39:50.721264 kernel: pci_bus 0005:00: on NUMA node 0 Apr 12 19:39:50.721327 kernel: pci 0005:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.721387 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.721447 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.721509 kernel: pci 0005:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.721568 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.721631 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.721691 kernel: pci 0005:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.721750 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.721812 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 19:39:50.721872 kernel: pci 0005:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.721931 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.721991 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x001fffff] to [bus 04] add_size 100000 add_align 100000 Apr 12 19:39:50.722052 kernel: pci 0005:00:01.0: BAR 14: assigned [mem 0x30000000-0x301fffff] Apr 12 19:39:50.722113 kernel: pci 0005:00:01.0: BAR 15: assigned [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 19:39:50.722172 kernel: pci 0005:00:03.0: BAR 14: assigned [mem 0x30200000-0x303fffff] Apr 12 19:39:50.722231 kernel: pci 0005:00:03.0: BAR 15: assigned [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 19:39:50.722289 kernel: pci 0005:00:05.0: BAR 14: assigned [mem 0x30400000-0x305fffff] Apr 12 19:39:50.722353 kernel: pci 0005:00:05.0: BAR 15: assigned [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 19:39:50.722414 kernel: pci 0005:00:07.0: BAR 14: assigned [mem 0x30600000-0x307fffff] Apr 12 19:39:50.722475 kernel: pci 0005:00:07.0: BAR 15: assigned [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 19:39:50.722534 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.722593 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.722652 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.722711 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.722771 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.722829 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.722890 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.722950 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.723009 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.723067 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.723127 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.723185 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.723243 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.723305 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.723364 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.723423 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.723483 kernel: pci 0005:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.723543 kernel: pci 0005:00:01.0: bridge window [mem 0x30000000-0x301fffff] Apr 12 19:39:50.723602 kernel: pci 0005:00:01.0: bridge window [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 19:39:50.723661 kernel: pci 0005:00:03.0: PCI bridge to [bus 02] Apr 12 19:39:50.723720 kernel: pci 0005:00:03.0: bridge window [mem 0x30200000-0x303fffff] Apr 12 19:39:50.723779 kernel: pci 0005:00:03.0: bridge window [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 19:39:50.723842 kernel: pci 0005:03:00.0: BAR 6: assigned [mem 0x30400000-0x3040ffff pref] Apr 12 19:39:50.723905 kernel: pci 0005:03:00.0: BAR 0: assigned [mem 0x30410000-0x30413fff 64bit] Apr 12 19:39:50.723964 kernel: pci 0005:00:05.0: PCI bridge to [bus 03] Apr 12 19:39:50.724023 kernel: pci 0005:00:05.0: bridge window [mem 0x30400000-0x305fffff] Apr 12 19:39:50.724083 kernel: pci 0005:00:05.0: bridge window [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 19:39:50.724145 kernel: pci 0005:04:00.0: BAR 6: assigned [mem 0x30600000-0x3060ffff pref] Apr 12 19:39:50.724207 kernel: pci 0005:04:00.0: BAR 0: assigned [mem 0x30610000-0x30613fff 64bit] Apr 12 19:39:50.724265 kernel: pci 0005:00:07.0: PCI bridge to [bus 04] Apr 12 19:39:50.724328 kernel: pci 0005:00:07.0: bridge window [mem 0x30600000-0x307fffff] Apr 12 19:39:50.724388 kernel: pci 0005:00:07.0: bridge window [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 19:39:50.724443 kernel: pci_bus 0005:00: resource 4 [mem 0x30000000-0x3fffffff window] Apr 12 19:39:50.724496 kernel: pci_bus 0005:00: resource 5 [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 19:39:50.724560 kernel: pci_bus 0005:01: resource 1 [mem 0x30000000-0x301fffff] Apr 12 19:39:50.724617 kernel: pci_bus 0005:01: resource 2 [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 19:39:50.724690 kernel: pci_bus 0005:02: resource 1 [mem 0x30200000-0x303fffff] Apr 12 19:39:50.724746 kernel: pci_bus 0005:02: resource 2 [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 19:39:50.724810 kernel: pci_bus 0005:03: resource 1 [mem 0x30400000-0x305fffff] Apr 12 19:39:50.724866 kernel: pci_bus 0005:03: resource 2 [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 19:39:50.724930 kernel: pci_bus 0005:04: resource 1 [mem 0x30600000-0x307fffff] Apr 12 19:39:50.724987 kernel: pci_bus 0005:04: resource 2 [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 19:39:50.724996 kernel: ACPI: PCI Root Bridge [PCI5] (domain 0003 [bus 00-ff]) Apr 12 19:39:50.725062 kernel: acpi PNP0A08:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.725119 kernel: acpi PNP0A08:03: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.725177 kernel: acpi PNP0A08:03: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.725234 kernel: acpi PNP0A08:03: MCFG quirk: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.725291 kernel: acpi PNP0A08:03: ECAM area [mem 0x27fff0000000-0x27ffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.725353 kernel: acpi PNP0A08:03: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] Apr 12 19:39:50.725363 kernel: PCI host bridge to bus 0003:00 Apr 12 19:39:50.725422 kernel: pci_bus 0003:00: root bus resource [mem 0x10000000-0x1fffffff window] Apr 12 19:39:50.725476 kernel: pci_bus 0003:00: root bus resource [mem 0x240000000000-0x27ffdfffffff window] Apr 12 19:39:50.725529 kernel: pci_bus 0003:00: root bus resource [bus 00-ff] Apr 12 19:39:50.725597 kernel: pci 0003:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:39:50.725665 kernel: pci 0003:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:39:50.725727 kernel: pci 0003:00:01.0: supports D1 D2 Apr 12 19:39:50.725786 kernel: pci 0003:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.725853 kernel: pci 0003:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:39:50.725913 kernel: pci 0003:00:03.0: supports D1 D2 Apr 12 19:39:50.725972 kernel: pci 0003:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.726040 kernel: pci 0003:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:39:50.726100 kernel: pci 0003:00:05.0: supports D1 D2 Apr 12 19:39:50.726161 kernel: pci 0003:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.726170 kernel: acpiphp: Slot [1-3] registered Apr 12 19:39:50.726176 kernel: acpiphp: Slot [2-3] registered Apr 12 19:39:50.726244 kernel: pci 0003:03:00.0: [8086:1521] type 00 class 0x020000 Apr 12 19:39:50.726309 kernel: pci 0003:03:00.0: reg 0x10: [mem 0x10020000-0x1003ffff] Apr 12 19:39:50.726371 kernel: pci 0003:03:00.0: reg 0x18: [io 0x0020-0x003f] Apr 12 19:39:50.726431 kernel: pci 0003:03:00.0: reg 0x1c: [mem 0x10044000-0x10047fff] Apr 12 19:39:50.726496 kernel: pci 0003:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 19:39:50.726559 kernel: pci 0003:03:00.0: reg 0x184: [mem 0x240000060000-0x240000063fff 64bit pref] Apr 12 19:39:50.726621 kernel: pci 0003:03:00.0: VF(n) BAR0 space: [mem 0x240000060000-0x24000007ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 19:39:50.726682 kernel: pci 0003:03:00.0: reg 0x190: [mem 0x240000040000-0x240000043fff 64bit pref] Apr 12 19:39:50.726744 kernel: pci 0003:03:00.0: VF(n) BAR3 space: [mem 0x240000040000-0x24000005ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 19:39:50.726805 kernel: pci 0003:03:00.0: 8.000 Gb/s available PCIe bandwidth, limited by 5.0 GT/s PCIe x2 link at 0003:00:05.0 (capable of 16.000 Gb/s with 5.0 GT/s PCIe x4 link) Apr 12 19:39:50.726875 kernel: pci 0003:03:00.1: [8086:1521] type 00 class 0x020000 Apr 12 19:39:50.726938 kernel: pci 0003:03:00.1: reg 0x10: [mem 0x10000000-0x1001ffff] Apr 12 19:39:50.726999 kernel: pci 0003:03:00.1: reg 0x18: [io 0x0000-0x001f] Apr 12 19:39:50.727060 kernel: pci 0003:03:00.1: reg 0x1c: [mem 0x10040000-0x10043fff] Apr 12 19:39:50.727124 kernel: pci 0003:03:00.1: PME# supported from D0 D3hot D3cold Apr 12 19:39:50.727189 kernel: pci 0003:03:00.1: reg 0x184: [mem 0x240000020000-0x240000023fff 64bit pref] Apr 12 19:39:50.727255 kernel: pci 0003:03:00.1: VF(n) BAR0 space: [mem 0x240000020000-0x24000003ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 19:39:50.727324 kernel: pci 0003:03:00.1: reg 0x190: [mem 0x240000000000-0x240000003fff 64bit pref] Apr 12 19:39:50.727388 kernel: pci 0003:03:00.1: VF(n) BAR3 space: [mem 0x240000000000-0x24000001ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 19:39:50.727444 kernel: pci_bus 0003:00: on NUMA node 0 Apr 12 19:39:50.727503 kernel: pci 0003:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.727563 kernel: pci 0003:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.727623 kernel: pci 0003:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.727685 kernel: pci 0003:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.727743 kernel: pci 0003:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.727802 kernel: pci 0003:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.727865 kernel: pci 0003:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03-04] add_size 300000 add_align 100000 Apr 12 19:39:50.727924 kernel: pci 0003:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03-04] add_size 100000 add_align 100000 Apr 12 19:39:50.727983 kernel: pci 0003:00:01.0: BAR 14: assigned [mem 0x10000000-0x101fffff] Apr 12 19:39:50.728042 kernel: pci 0003:00:01.0: BAR 15: assigned [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 19:39:50.728102 kernel: pci 0003:00:03.0: BAR 14: assigned [mem 0x10200000-0x103fffff] Apr 12 19:39:50.728162 kernel: pci 0003:00:03.0: BAR 15: assigned [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 19:39:50.728222 kernel: pci 0003:00:05.0: BAR 14: assigned [mem 0x10400000-0x105fffff] Apr 12 19:39:50.728282 kernel: pci 0003:00:05.0: BAR 15: assigned [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 19:39:50.728424 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.728484 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.728542 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.728600 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.728659 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.728727 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.728787 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.728846 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.728904 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.728963 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.729021 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.729080 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.729137 kernel: pci 0003:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.729196 kernel: pci 0003:00:01.0: bridge window [mem 0x10000000-0x101fffff] Apr 12 19:39:50.729254 kernel: pci 0003:00:01.0: bridge window [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 19:39:50.729317 kernel: pci 0003:00:03.0: PCI bridge to [bus 02] Apr 12 19:39:50.729375 kernel: pci 0003:00:03.0: bridge window [mem 0x10200000-0x103fffff] Apr 12 19:39:50.729433 kernel: pci 0003:00:03.0: bridge window [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 19:39:50.729495 kernel: pci 0003:03:00.0: BAR 0: assigned [mem 0x10400000-0x1041ffff] Apr 12 19:39:50.729556 kernel: pci 0003:03:00.1: BAR 0: assigned [mem 0x10420000-0x1043ffff] Apr 12 19:39:50.729617 kernel: pci 0003:03:00.0: BAR 3: assigned [mem 0x10440000-0x10443fff] Apr 12 19:39:50.729679 kernel: pci 0003:03:00.0: BAR 7: assigned [mem 0x240000400000-0x24000041ffff 64bit pref] Apr 12 19:39:50.729742 kernel: pci 0003:03:00.0: BAR 10: assigned [mem 0x240000420000-0x24000043ffff 64bit pref] Apr 12 19:39:50.729804 kernel: pci 0003:03:00.1: BAR 3: assigned [mem 0x10444000-0x10447fff] Apr 12 19:39:50.729864 kernel: pci 0003:03:00.1: BAR 7: assigned [mem 0x240000440000-0x24000045ffff 64bit pref] Apr 12 19:39:50.729925 kernel: pci 0003:03:00.1: BAR 10: assigned [mem 0x240000460000-0x24000047ffff 64bit pref] Apr 12 19:39:50.729988 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 19:39:50.730049 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 19:39:50.730111 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 19:39:50.730173 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 19:39:50.730233 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 19:39:50.730295 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 19:39:50.730357 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 19:39:50.730417 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 19:39:50.730477 kernel: pci 0003:00:05.0: PCI bridge to [bus 03-04] Apr 12 19:39:50.730536 kernel: pci 0003:00:05.0: bridge window [mem 0x10400000-0x105fffff] Apr 12 19:39:50.730596 kernel: pci 0003:00:05.0: bridge window [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 19:39:50.730649 kernel: pci_bus 0003:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 19:39:50.730702 kernel: pci_bus 0003:00: resource 4 [mem 0x10000000-0x1fffffff window] Apr 12 19:39:50.730755 kernel: pci_bus 0003:00: resource 5 [mem 0x240000000000-0x27ffdfffffff window] Apr 12 19:39:50.730826 kernel: pci_bus 0003:01: resource 1 [mem 0x10000000-0x101fffff] Apr 12 19:39:50.730883 kernel: pci_bus 0003:01: resource 2 [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 19:39:50.730948 kernel: pci_bus 0003:02: resource 1 [mem 0x10200000-0x103fffff] Apr 12 19:39:50.731004 kernel: pci_bus 0003:02: resource 2 [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 19:39:50.731065 kernel: pci_bus 0003:03: resource 1 [mem 0x10400000-0x105fffff] Apr 12 19:39:50.731121 kernel: pci_bus 0003:03: resource 2 [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 19:39:50.731130 kernel: ACPI: PCI Root Bridge [PCI0] (domain 000c [bus 00-ff]) Apr 12 19:39:50.731194 kernel: acpi PNP0A08:04: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.731253 kernel: acpi PNP0A08:04: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.731389 kernel: acpi PNP0A08:04: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.731451 kernel: acpi PNP0A08:04: MCFG quirk: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.731508 kernel: acpi PNP0A08:04: ECAM area [mem 0x33fff0000000-0x33ffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.731564 kernel: acpi PNP0A08:04: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] Apr 12 19:39:50.731574 kernel: PCI host bridge to bus 000c:00 Apr 12 19:39:50.731633 kernel: pci_bus 000c:00: root bus resource [mem 0x40000000-0x4fffffff window] Apr 12 19:39:50.731687 kernel: pci_bus 000c:00: root bus resource [mem 0x300000000000-0x33ffdfffffff window] Apr 12 19:39:50.731742 kernel: pci_bus 000c:00: root bus resource [bus 00-ff] Apr 12 19:39:50.731808 kernel: pci 000c:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:39:50.731874 kernel: pci 000c:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:39:50.731934 kernel: pci 000c:00:01.0: enabling Extended Tags Apr 12 19:39:50.731993 kernel: pci 000c:00:01.0: supports D1 D2 Apr 12 19:39:50.732053 kernel: pci 000c:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.732124 kernel: pci 000c:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:39:50.732184 kernel: pci 000c:00:02.0: supports D1 D2 Apr 12 19:39:50.732247 kernel: pci 000c:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.732319 kernel: pci 000c:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:39:50.732443 kernel: pci 000c:00:03.0: supports D1 D2 Apr 12 19:39:50.732507 kernel: pci 000c:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.732574 kernel: pci 000c:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:39:50.732635 kernel: pci 000c:00:04.0: supports D1 D2 Apr 12 19:39:50.732693 kernel: pci 000c:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.732702 kernel: acpiphp: Slot [1-4] registered Apr 12 19:39:50.732710 kernel: acpiphp: Slot [2-4] registered Apr 12 19:39:50.732717 kernel: acpiphp: Slot [3-2] registered Apr 12 19:39:50.732724 kernel: acpiphp: Slot [4-2] registered Apr 12 19:39:50.732776 kernel: pci_bus 000c:00: on NUMA node 0 Apr 12 19:39:50.732836 kernel: pci 000c:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.732894 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.732955 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.733016 kernel: pci 000c:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.733074 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.733133 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.733192 kernel: pci 000c:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.733257 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.733322 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.733381 kernel: pci 000c:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.733440 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.733498 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.733557 kernel: pci 000c:00:01.0: BAR 14: assigned [mem 0x40000000-0x401fffff] Apr 12 19:39:50.733616 kernel: pci 000c:00:01.0: BAR 15: assigned [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 19:39:50.733675 kernel: pci 000c:00:02.0: BAR 14: assigned [mem 0x40200000-0x403fffff] Apr 12 19:39:50.733734 kernel: pci 000c:00:02.0: BAR 15: assigned [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 19:39:50.733793 kernel: pci 000c:00:03.0: BAR 14: assigned [mem 0x40400000-0x405fffff] Apr 12 19:39:50.733851 kernel: pci 000c:00:03.0: BAR 15: assigned [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 19:39:50.733909 kernel: pci 000c:00:04.0: BAR 14: assigned [mem 0x40600000-0x407fffff] Apr 12 19:39:50.733968 kernel: pci 000c:00:04.0: BAR 15: assigned [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 19:39:50.734026 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734085 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734144 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734204 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734262 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734323 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734382 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734440 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734499 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734556 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734615 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734672 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734733 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734791 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734849 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.734907 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.734965 kernel: pci 000c:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.735024 kernel: pci 000c:00:01.0: bridge window [mem 0x40000000-0x401fffff] Apr 12 19:39:50.735081 kernel: pci 000c:00:01.0: bridge window [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 19:39:50.735140 kernel: pci 000c:00:02.0: PCI bridge to [bus 02] Apr 12 19:39:50.735199 kernel: pci 000c:00:02.0: bridge window [mem 0x40200000-0x403fffff] Apr 12 19:39:50.735257 kernel: pci 000c:00:02.0: bridge window [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 19:39:50.735487 kernel: pci 000c:00:03.0: PCI bridge to [bus 03] Apr 12 19:39:50.735550 kernel: pci 000c:00:03.0: bridge window [mem 0x40400000-0x405fffff] Apr 12 19:39:50.735608 kernel: pci 000c:00:03.0: bridge window [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 19:39:50.735667 kernel: pci 000c:00:04.0: PCI bridge to [bus 04] Apr 12 19:39:50.735730 kernel: pci 000c:00:04.0: bridge window [mem 0x40600000-0x407fffff] Apr 12 19:39:50.735788 kernel: pci 000c:00:04.0: bridge window [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 19:39:50.735841 kernel: pci_bus 000c:00: resource 4 [mem 0x40000000-0x4fffffff window] Apr 12 19:39:50.735893 kernel: pci_bus 000c:00: resource 5 [mem 0x300000000000-0x33ffdfffffff window] Apr 12 19:39:50.735957 kernel: pci_bus 000c:01: resource 1 [mem 0x40000000-0x401fffff] Apr 12 19:39:50.736012 kernel: pci_bus 000c:01: resource 2 [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 19:39:50.736076 kernel: pci_bus 000c:02: resource 1 [mem 0x40200000-0x403fffff] Apr 12 19:39:50.736132 kernel: pci_bus 000c:02: resource 2 [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 19:39:50.736204 kernel: pci_bus 000c:03: resource 1 [mem 0x40400000-0x405fffff] Apr 12 19:39:50.736259 kernel: pci_bus 000c:03: resource 2 [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 19:39:50.736325 kernel: pci_bus 000c:04: resource 1 [mem 0x40600000-0x407fffff] Apr 12 19:39:50.736380 kernel: pci_bus 000c:04: resource 2 [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 19:39:50.736393 kernel: ACPI: PCI Root Bridge [PCI4] (domain 0002 [bus 00-ff]) Apr 12 19:39:50.736456 kernel: acpi PNP0A08:05: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.736514 kernel: acpi PNP0A08:05: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.736570 kernel: acpi PNP0A08:05: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.736627 kernel: acpi PNP0A08:05: MCFG quirk: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.736682 kernel: acpi PNP0A08:05: ECAM area [mem 0x23fff0000000-0x23ffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.736738 kernel: acpi PNP0A08:05: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] Apr 12 19:39:50.736749 kernel: PCI host bridge to bus 0002:00 Apr 12 19:39:50.736807 kernel: pci_bus 0002:00: root bus resource [mem 0x00800000-0x0fffffff window] Apr 12 19:39:50.736859 kernel: pci_bus 0002:00: root bus resource [mem 0x200000000000-0x23ffdfffffff window] Apr 12 19:39:50.736911 kernel: pci_bus 0002:00: root bus resource [bus 00-ff] Apr 12 19:39:50.736977 kernel: pci 0002:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:39:50.737042 kernel: pci 0002:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:39:50.737101 kernel: pci 0002:00:01.0: supports D1 D2 Apr 12 19:39:50.737161 kernel: pci 0002:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.737225 kernel: pci 0002:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:39:50.737284 kernel: pci 0002:00:03.0: supports D1 D2 Apr 12 19:39:50.737345 kernel: pci 0002:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.737409 kernel: pci 0002:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:39:50.737469 kernel: pci 0002:00:05.0: supports D1 D2 Apr 12 19:39:50.737527 kernel: pci 0002:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.737593 kernel: pci 0002:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 19:39:50.737651 kernel: pci 0002:00:07.0: supports D1 D2 Apr 12 19:39:50.737711 kernel: pci 0002:00:07.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.737720 kernel: acpiphp: Slot [1-5] registered Apr 12 19:39:50.737728 kernel: acpiphp: Slot [2-5] registered Apr 12 19:39:50.737735 kernel: acpiphp: Slot [3-3] registered Apr 12 19:39:50.737742 kernel: acpiphp: Slot [4-3] registered Apr 12 19:39:50.737794 kernel: pci_bus 0002:00: on NUMA node 0 Apr 12 19:39:50.737854 kernel: pci 0002:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.737913 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.737971 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:39:50.738031 kernel: pci 0002:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.738091 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.738148 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.738207 kernel: pci 0002:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.738264 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.738327 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.738386 kernel: pci 0002:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.738445 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.738505 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.738566 kernel: pci 0002:00:01.0: BAR 14: assigned [mem 0x00800000-0x009fffff] Apr 12 19:39:50.738624 kernel: pci 0002:00:01.0: BAR 15: assigned [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 19:39:50.738683 kernel: pci 0002:00:03.0: BAR 14: assigned [mem 0x00a00000-0x00bfffff] Apr 12 19:39:50.738743 kernel: pci 0002:00:03.0: BAR 15: assigned [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 19:39:50.738801 kernel: pci 0002:00:05.0: BAR 14: assigned [mem 0x00c00000-0x00dfffff] Apr 12 19:39:50.738860 kernel: pci 0002:00:05.0: BAR 15: assigned [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 19:39:50.738918 kernel: pci 0002:00:07.0: BAR 14: assigned [mem 0x00e00000-0x00ffffff] Apr 12 19:39:50.738978 kernel: pci 0002:00:07.0: BAR 15: assigned [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 19:39:50.739036 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739094 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739153 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739211 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739270 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739331 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739390 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739450 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739509 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739567 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739625 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739684 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739742 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739801 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739859 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.739918 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.739977 kernel: pci 0002:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.740035 kernel: pci 0002:00:01.0: bridge window [mem 0x00800000-0x009fffff] Apr 12 19:39:50.740094 kernel: pci 0002:00:01.0: bridge window [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 19:39:50.740152 kernel: pci 0002:00:03.0: PCI bridge to [bus 02] Apr 12 19:39:50.740211 kernel: pci 0002:00:03.0: bridge window [mem 0x00a00000-0x00bfffff] Apr 12 19:39:50.740269 kernel: pci 0002:00:03.0: bridge window [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 19:39:50.740332 kernel: pci 0002:00:05.0: PCI bridge to [bus 03] Apr 12 19:39:50.740391 kernel: pci 0002:00:05.0: bridge window [mem 0x00c00000-0x00dfffff] Apr 12 19:39:50.740449 kernel: pci 0002:00:05.0: bridge window [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 19:39:50.740507 kernel: pci 0002:00:07.0: PCI bridge to [bus 04] Apr 12 19:39:50.740565 kernel: pci 0002:00:07.0: bridge window [mem 0x00e00000-0x00ffffff] Apr 12 19:39:50.740624 kernel: pci 0002:00:07.0: bridge window [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 19:39:50.740679 kernel: pci_bus 0002:00: resource 4 [mem 0x00800000-0x0fffffff window] Apr 12 19:39:50.740731 kernel: pci_bus 0002:00: resource 5 [mem 0x200000000000-0x23ffdfffffff window] Apr 12 19:39:50.740795 kernel: pci_bus 0002:01: resource 1 [mem 0x00800000-0x009fffff] Apr 12 19:39:50.740851 kernel: pci_bus 0002:01: resource 2 [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 19:39:50.740913 kernel: pci_bus 0002:02: resource 1 [mem 0x00a00000-0x00bfffff] Apr 12 19:39:50.740968 kernel: pci_bus 0002:02: resource 2 [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 19:39:50.741037 kernel: pci_bus 0002:03: resource 1 [mem 0x00c00000-0x00dfffff] Apr 12 19:39:50.741095 kernel: pci_bus 0002:03: resource 2 [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 19:39:50.741157 kernel: pci_bus 0002:04: resource 1 [mem 0x00e00000-0x00ffffff] Apr 12 19:39:50.741212 kernel: pci_bus 0002:04: resource 2 [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 19:39:50.741221 kernel: ACPI: PCI Root Bridge [PCI2] (domain 0001 [bus 00-ff]) Apr 12 19:39:50.741285 kernel: acpi PNP0A08:06: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.741345 kernel: acpi PNP0A08:06: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.741404 kernel: acpi PNP0A08:06: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.741460 kernel: acpi PNP0A08:06: MCFG quirk: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.741517 kernel: acpi PNP0A08:06: ECAM area [mem 0x3bfff0000000-0x3bffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.741573 kernel: acpi PNP0A08:06: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] Apr 12 19:39:50.741582 kernel: PCI host bridge to bus 0001:00 Apr 12 19:39:50.741640 kernel: pci_bus 0001:00: root bus resource [mem 0x60000000-0x6fffffff window] Apr 12 19:39:50.741696 kernel: pci_bus 0001:00: root bus resource [mem 0x380000000000-0x3bffdfffffff window] Apr 12 19:39:50.741748 kernel: pci_bus 0001:00: root bus resource [bus 00-ff] Apr 12 19:39:50.741815 kernel: pci 0001:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:39:50.741885 kernel: pci 0001:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:39:50.741945 kernel: pci 0001:00:01.0: enabling Extended Tags Apr 12 19:39:50.742003 kernel: pci 0001:00:01.0: supports D1 D2 Apr 12 19:39:50.742061 kernel: pci 0001:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.742128 kernel: pci 0001:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:39:50.742186 kernel: pci 0001:00:02.0: supports D1 D2 Apr 12 19:39:50.742262 kernel: pci 0001:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.742334 kernel: pci 0001:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:39:50.742395 kernel: pci 0001:00:03.0: supports D1 D2 Apr 12 19:39:50.742453 kernel: pci 0001:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.742518 kernel: pci 0001:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:39:50.742580 kernel: pci 0001:00:04.0: supports D1 D2 Apr 12 19:39:50.742638 kernel: pci 0001:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.742648 kernel: acpiphp: Slot [1-6] registered Apr 12 19:39:50.742716 kernel: pci 0001:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 19:39:50.742778 kernel: pci 0001:01:00.0: reg 0x10: [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 19:39:50.742839 kernel: pci 0001:01:00.0: reg 0x30: [mem 0x60100000-0x601fffff pref] Apr 12 19:39:50.742900 kernel: pci 0001:01:00.0: PME# supported from D3cold Apr 12 19:39:50.742962 kernel: pci 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 19:39:50.743031 kernel: pci 0001:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 19:39:50.743094 kernel: pci 0001:01:00.1: reg 0x10: [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 19:39:50.743155 kernel: pci 0001:01:00.1: reg 0x30: [mem 0x60000000-0x600fffff pref] Apr 12 19:39:50.743217 kernel: pci 0001:01:00.1: PME# supported from D3cold Apr 12 19:39:50.743227 kernel: acpiphp: Slot [2-6] registered Apr 12 19:39:50.743234 kernel: acpiphp: Slot [3-4] registered Apr 12 19:39:50.743241 kernel: acpiphp: Slot [4-4] registered Apr 12 19:39:50.743299 kernel: pci_bus 0001:00: on NUMA node 0 Apr 12 19:39:50.743359 kernel: pci 0001:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:39:50.743419 kernel: pci 0001:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:39:50.743479 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.743538 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:39:50.743597 kernel: pci 0001:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.743656 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.743716 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.743776 kernel: pci 0001:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.743835 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.743893 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.743952 kernel: pci 0001:00:01.0: BAR 15: assigned [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 19:39:50.744010 kernel: pci 0001:00:01.0: BAR 14: assigned [mem 0x60000000-0x601fffff] Apr 12 19:39:50.744069 kernel: pci 0001:00:02.0: BAR 14: assigned [mem 0x60200000-0x603fffff] Apr 12 19:39:50.744129 kernel: pci 0001:00:02.0: BAR 15: assigned [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 19:39:50.744188 kernel: pci 0001:00:03.0: BAR 14: assigned [mem 0x60400000-0x605fffff] Apr 12 19:39:50.744246 kernel: pci 0001:00:03.0: BAR 15: assigned [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 19:39:50.744307 kernel: pci 0001:00:04.0: BAR 14: assigned [mem 0x60600000-0x607fffff] Apr 12 19:39:50.744366 kernel: pci 0001:00:04.0: BAR 15: assigned [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 19:39:50.744424 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.744484 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.744542 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.744603 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.744661 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.744719 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.744778 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.744835 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.744893 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.744951 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.745009 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.745068 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.745126 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.745184 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.745242 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.745303 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.745365 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 19:39:50.745427 kernel: pci 0001:01:00.1: BAR 0: assigned [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 19:39:50.745488 kernel: pci 0001:01:00.0: BAR 6: assigned [mem 0x60000000-0x600fffff pref] Apr 12 19:39:50.745550 kernel: pci 0001:01:00.1: BAR 6: assigned [mem 0x60100000-0x601fffff pref] Apr 12 19:39:50.745611 kernel: pci 0001:00:01.0: PCI bridge to [bus 01] Apr 12 19:39:50.745670 kernel: pci 0001:00:01.0: bridge window [mem 0x60000000-0x601fffff] Apr 12 19:39:50.745728 kernel: pci 0001:00:01.0: bridge window [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 19:39:50.745787 kernel: pci 0001:00:02.0: PCI bridge to [bus 02] Apr 12 19:39:50.745845 kernel: pci 0001:00:02.0: bridge window [mem 0x60200000-0x603fffff] Apr 12 19:39:50.745903 kernel: pci 0001:00:02.0: bridge window [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 19:39:50.745963 kernel: pci 0001:00:03.0: PCI bridge to [bus 03] Apr 12 19:39:50.746022 kernel: pci 0001:00:03.0: bridge window [mem 0x60400000-0x605fffff] Apr 12 19:39:50.746081 kernel: pci 0001:00:03.0: bridge window [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 19:39:50.746140 kernel: pci 0001:00:04.0: PCI bridge to [bus 04] Apr 12 19:39:50.746198 kernel: pci 0001:00:04.0: bridge window [mem 0x60600000-0x607fffff] Apr 12 19:39:50.746256 kernel: pci 0001:00:04.0: bridge window [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 19:39:50.746313 kernel: pci_bus 0001:00: resource 4 [mem 0x60000000-0x6fffffff window] Apr 12 19:39:50.746367 kernel: pci_bus 0001:00: resource 5 [mem 0x380000000000-0x3bffdfffffff window] Apr 12 19:39:50.746437 kernel: pci_bus 0001:01: resource 1 [mem 0x60000000-0x601fffff] Apr 12 19:39:50.746495 kernel: pci_bus 0001:01: resource 2 [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 19:39:50.746557 kernel: pci_bus 0001:02: resource 1 [mem 0x60200000-0x603fffff] Apr 12 19:39:50.746612 kernel: pci_bus 0001:02: resource 2 [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 19:39:50.746677 kernel: pci_bus 0001:03: resource 1 [mem 0x60400000-0x605fffff] Apr 12 19:39:50.746732 kernel: pci_bus 0001:03: resource 2 [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 19:39:50.746794 kernel: pci_bus 0001:04: resource 1 [mem 0x60600000-0x607fffff] Apr 12 19:39:50.746851 kernel: pci_bus 0001:04: resource 2 [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 19:39:50.746860 kernel: ACPI: PCI Root Bridge [PCI6] (domain 0004 [bus 00-ff]) Apr 12 19:39:50.746925 kernel: acpi PNP0A08:07: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:39:50.746982 kernel: acpi PNP0A08:07: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:39:50.747041 kernel: acpi PNP0A08:07: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:39:50.747098 kernel: acpi PNP0A08:07: MCFG quirk: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:39:50.747154 kernel: acpi PNP0A08:07: ECAM area [mem 0x2bfff0000000-0x2bffffffffff] reserved by PNP0C02:00 Apr 12 19:39:50.747210 kernel: acpi PNP0A08:07: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] Apr 12 19:39:50.747220 kernel: PCI host bridge to bus 0004:00 Apr 12 19:39:50.747278 kernel: pci_bus 0004:00: root bus resource [mem 0x20000000-0x2fffffff window] Apr 12 19:39:50.747335 kernel: pci_bus 0004:00: root bus resource [mem 0x280000000000-0x2bffdfffffff window] Apr 12 19:39:50.747390 kernel: pci_bus 0004:00: root bus resource [bus 00-ff] Apr 12 19:39:50.747457 kernel: pci 0004:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:39:50.747524 kernel: pci 0004:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:39:50.747584 kernel: pci 0004:00:01.0: supports D1 D2 Apr 12 19:39:50.747643 kernel: pci 0004:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.747710 kernel: pci 0004:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:39:50.747773 kernel: pci 0004:00:03.0: supports D1 D2 Apr 12 19:39:50.747832 kernel: pci 0004:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.747902 kernel: pci 0004:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:39:50.747961 kernel: pci 0004:00:05.0: supports D1 D2 Apr 12 19:39:50.748024 kernel: pci 0004:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:39:50.748095 kernel: pci 0004:01:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 19:39:50.748159 kernel: pci 0004:01:00.0: enabling Extended Tags Apr 12 19:39:50.748222 kernel: pci 0004:01:00.0: supports D1 D2 Apr 12 19:39:50.748286 kernel: pci 0004:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 19:39:50.748357 kernel: pci_bus 0004:02: extended config space not accessible Apr 12 19:39:50.748437 kernel: pci 0004:02:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 19:39:50.748503 kernel: pci 0004:02:00.0: reg 0x10: [mem 0x20000000-0x21ffffff] Apr 12 19:39:50.748569 kernel: pci 0004:02:00.0: reg 0x14: [mem 0x22000000-0x2201ffff] Apr 12 19:39:50.748634 kernel: pci 0004:02:00.0: reg 0x18: [io 0x0000-0x007f] Apr 12 19:39:50.748702 kernel: pci 0004:02:00.0: BAR 0: assigned to efifb Apr 12 19:39:50.748767 kernel: pci 0004:02:00.0: supports D1 D2 Apr 12 19:39:50.748832 kernel: pci 0004:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 19:39:50.748902 kernel: pci 0004:03:00.0: [1912:0014] type 00 class 0x0c0330 Apr 12 19:39:50.748965 kernel: pci 0004:03:00.0: reg 0x10: [mem 0x22200000-0x22201fff 64bit] Apr 12 19:39:50.749029 kernel: pci 0004:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 19:39:50.749084 kernel: pci_bus 0004:00: on NUMA node 0 Apr 12 19:39:50.749148 kernel: pci 0004:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01-02] add_size 200000 add_align 100000 Apr 12 19:39:50.749209 kernel: pci 0004:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:39:50.749271 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:39:50.749333 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 19:39:50.749396 kernel: pci 0004:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:39:50.749457 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.749518 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:39:50.749581 kernel: pci 0004:00:01.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 19:39:50.749640 kernel: pci 0004:00:01.0: BAR 15: assigned [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 19:39:50.749702 kernel: pci 0004:00:03.0: BAR 14: assigned [mem 0x23000000-0x231fffff] Apr 12 19:39:50.749761 kernel: pci 0004:00:03.0: BAR 15: assigned [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 19:39:50.749822 kernel: pci 0004:00:05.0: BAR 14: assigned [mem 0x23200000-0x233fffff] Apr 12 19:39:50.749882 kernel: pci 0004:00:05.0: BAR 15: assigned [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 19:39:50.749941 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750001 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750062 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750123 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750181 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750242 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750304 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750364 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750424 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750484 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750546 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750605 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750669 kernel: pci 0004:01:00.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 19:39:50.750731 kernel: pci 0004:01:00.0: BAR 13: no space for [io size 0x1000] Apr 12 19:39:50.750795 kernel: pci 0004:01:00.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:39:50.750861 kernel: pci 0004:02:00.0: BAR 0: assigned [mem 0x20000000-0x21ffffff] Apr 12 19:39:50.750927 kernel: pci 0004:02:00.0: BAR 1: assigned [mem 0x22000000-0x2201ffff] Apr 12 19:39:50.750991 kernel: pci 0004:02:00.0: BAR 2: no space for [io size 0x0080] Apr 12 19:39:50.751058 kernel: pci 0004:02:00.0: BAR 2: failed to assign [io size 0x0080] Apr 12 19:39:50.751120 kernel: pci 0004:01:00.0: PCI bridge to [bus 02] Apr 12 19:39:50.751183 kernel: pci 0004:01:00.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 19:39:50.751243 kernel: pci 0004:00:01.0: PCI bridge to [bus 01-02] Apr 12 19:39:50.751305 kernel: pci 0004:00:01.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 19:39:50.751367 kernel: pci 0004:00:01.0: bridge window [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 19:39:50.751431 kernel: pci 0004:03:00.0: BAR 0: assigned [mem 0x23000000-0x23001fff 64bit] Apr 12 19:39:50.751493 kernel: pci 0004:00:03.0: PCI bridge to [bus 03] Apr 12 19:39:50.751555 kernel: pci 0004:00:03.0: bridge window [mem 0x23000000-0x231fffff] Apr 12 19:39:50.751618 kernel: pci 0004:00:03.0: bridge window [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 19:39:50.751678 kernel: pci 0004:00:05.0: PCI bridge to [bus 04] Apr 12 19:39:50.751740 kernel: pci 0004:00:05.0: bridge window [mem 0x23200000-0x233fffff] Apr 12 19:39:50.751801 kernel: pci 0004:00:05.0: bridge window [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 19:39:50.751858 kernel: pci_bus 0004:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 19:39:50.751914 kernel: pci_bus 0004:00: resource 4 [mem 0x20000000-0x2fffffff window] Apr 12 19:39:50.751970 kernel: pci_bus 0004:00: resource 5 [mem 0x280000000000-0x2bffdfffffff window] Apr 12 19:39:50.752038 kernel: pci_bus 0004:01: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 19:39:50.752097 kernel: pci_bus 0004:01: resource 2 [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 19:39:50.752159 kernel: pci_bus 0004:02: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 19:39:50.752223 kernel: pci_bus 0004:03: resource 1 [mem 0x23000000-0x231fffff] Apr 12 19:39:50.752281 kernel: pci_bus 0004:03: resource 2 [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 19:39:50.752352 kernel: pci_bus 0004:04: resource 1 [mem 0x23200000-0x233fffff] Apr 12 19:39:50.752410 kernel: pci_bus 0004:04: resource 2 [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 19:39:50.752420 kernel: iommu: Default domain type: Translated Apr 12 19:39:50.752427 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 19:39:50.752494 kernel: pci 0004:02:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none Apr 12 19:39:50.752561 kernel: pci 0004:02:00.0: vgaarb: bridge control possible Apr 12 19:39:50.752628 kernel: pci 0004:02:00.0: vgaarb: setting as boot device (VGA legacy resources not available) Apr 12 19:39:50.752639 kernel: vgaarb: loaded Apr 12 19:39:50.752647 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 19:39:50.752654 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 19:39:50.752661 kernel: PTP clock support registered Apr 12 19:39:50.752668 kernel: Registered efivars operations Apr 12 19:39:50.752676 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 19:39:50.752683 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 19:39:50.752691 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 19:39:50.752699 kernel: pnp: PnP ACPI init Apr 12 19:39:50.752763 kernel: system 00:00: [mem 0x3bfff0000000-0x3bffffffffff window] could not be reserved Apr 12 19:39:50.752821 kernel: system 00:00: [mem 0x3ffff0000000-0x3fffffffffff window] could not be reserved Apr 12 19:39:50.752876 kernel: system 00:00: [mem 0x23fff0000000-0x23ffffffffff window] could not be reserved Apr 12 19:39:50.752932 kernel: system 00:00: [mem 0x27fff0000000-0x27ffffffffff window] could not be reserved Apr 12 19:39:50.752985 kernel: system 00:00: [mem 0x2bfff0000000-0x2bffffffffff window] could not be reserved Apr 12 19:39:50.753038 kernel: system 00:00: [mem 0x2ffff0000000-0x2fffffffffff window] could not be reserved Apr 12 19:39:50.753094 kernel: system 00:00: [mem 0x33fff0000000-0x33ffffffffff window] could not be reserved Apr 12 19:39:50.753148 kernel: system 00:00: [mem 0x37fff0000000-0x37ffffffffff window] could not be reserved Apr 12 19:39:50.753157 kernel: pnp: PnP ACPI: found 1 devices Apr 12 19:39:50.753164 kernel: NET: Registered PF_INET protocol family Apr 12 19:39:50.753171 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:39:50.753179 kernel: tcp_listen_portaddr_hash hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 19:39:50.753186 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 19:39:50.753193 kernel: TCP established hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 19:39:50.753200 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 19:39:50.753209 kernel: TCP: Hash tables configured (established 524288 bind 65536) Apr 12 19:39:50.753216 kernel: UDP hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 19:39:50.753224 kernel: UDP-Lite hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 19:39:50.753231 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 19:39:50.753298 kernel: pci 0001:01:00.0: CLS mismatch (64 != 32), using 64 bytes Apr 12 19:39:50.753308 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 19:39:50.753315 kernel: kvm [1]: IPA Size Limit: 48 bits Apr 12 19:39:50.753323 kernel: kvm [1]: GICv3: no GICV resource entry Apr 12 19:39:50.753332 kernel: kvm [1]: disabling GICv2 emulation Apr 12 19:39:50.753339 kernel: kvm [1]: GIC system register CPU interface enabled Apr 12 19:39:50.753347 kernel: kvm [1]: vgic interrupt IRQ9 Apr 12 19:39:50.753354 kernel: kvm [1]: VHE mode initialized successfully Apr 12 19:39:50.753361 kernel: Initialise system trusted keyrings Apr 12 19:39:50.753368 kernel: workingset: timestamp_bits=39 max_order=26 bucket_order=0 Apr 12 19:39:50.753376 kernel: Key type asymmetric registered Apr 12 19:39:50.753383 kernel: Asymmetric key parser 'x509' registered Apr 12 19:39:50.753390 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 19:39:50.753398 kernel: io scheduler mq-deadline registered Apr 12 19:39:50.753406 kernel: io scheduler kyber registered Apr 12 19:39:50.753413 kernel: io scheduler bfq registered Apr 12 19:39:50.753421 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 19:39:50.753428 kernel: ACPI: button: Power Button [PWRB] Apr 12 19:39:50.753437 kernel: ACPI GTDT: found 1 SBSA generic Watchdog(s). Apr 12 19:39:50.753444 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 19:39:50.753513 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: option mask 0x0 Apr 12 19:39:50.753572 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.753630 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.753686 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.753741 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 128 entries for evtq Apr 12 19:39:50.753796 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 256 entries for priq Apr 12 19:39:50.753860 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: option mask 0x0 Apr 12 19:39:50.753916 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.753976 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.754031 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.754087 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 128 entries for evtq Apr 12 19:39:50.754141 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 256 entries for priq Apr 12 19:39:50.754204 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: option mask 0x0 Apr 12 19:39:50.754260 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.754318 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.754379 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.754434 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 128 entries for evtq Apr 12 19:39:50.754492 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 256 entries for priq Apr 12 19:39:50.754554 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: option mask 0x0 Apr 12 19:39:50.754611 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.754667 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.754725 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.754781 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 128 entries for evtq Apr 12 19:39:50.754836 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 256 entries for priq Apr 12 19:39:50.754908 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: option mask 0x0 Apr 12 19:39:50.754965 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.755022 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.755079 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.755135 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 128 entries for evtq Apr 12 19:39:50.755190 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 256 entries for priq Apr 12 19:39:50.755254 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: option mask 0x0 Apr 12 19:39:50.755315 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.755371 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.755427 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.755482 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 128 entries for evtq Apr 12 19:39:50.755539 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 256 entries for priq Apr 12 19:39:50.755601 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: option mask 0x0 Apr 12 19:39:50.755656 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.755713 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.755767 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.755823 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 128 entries for evtq Apr 12 19:39:50.755880 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 256 entries for priq Apr 12 19:39:50.755942 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: option mask 0x0 Apr 12 19:39:50.755998 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:39:50.756053 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:39:50.756109 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 262144 entries for cmdq Apr 12 19:39:50.756164 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 128 entries for evtq Apr 12 19:39:50.756221 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 256 entries for priq Apr 12 19:39:50.756231 kernel: thunder_xcv, ver 1.0 Apr 12 19:39:50.756238 kernel: thunder_bgx, ver 1.0 Apr 12 19:39:50.756245 kernel: nicpf, ver 1.0 Apr 12 19:39:50.756252 kernel: nicvf, ver 1.0 Apr 12 19:39:50.756319 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 19:39:50.756377 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T19:39:49 UTC (1712950789) Apr 12 19:39:50.756387 kernel: efifb: probing for efifb Apr 12 19:39:50.756396 kernel: efifb: framebuffer at 0x20000000, using 1876k, total 1875k Apr 12 19:39:50.756403 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Apr 12 19:39:50.756410 kernel: efifb: scrolling: redraw Apr 12 19:39:50.756417 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 19:39:50.756426 kernel: Console: switching to colour frame buffer device 100x37 Apr 12 19:39:50.756433 kernel: fb0: EFI VGA frame buffer device Apr 12 19:39:50.756441 kernel: SMCCC: SOC_ID: ID = jep106:0a16:0001 Revision = 0x000000a1 Apr 12 19:39:50.756448 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 19:39:50.756455 kernel: NET: Registered PF_INET6 protocol family Apr 12 19:39:50.756463 kernel: Segment Routing with IPv6 Apr 12 19:39:50.756471 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 19:39:50.756478 kernel: NET: Registered PF_PACKET protocol family Apr 12 19:39:50.756485 kernel: Key type dns_resolver registered Apr 12 19:39:50.756492 kernel: registered taskstats version 1 Apr 12 19:39:50.756499 kernel: Loading compiled-in X.509 certificates Apr 12 19:39:50.756507 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 19:39:50.756514 kernel: Key type .fscrypt registered Apr 12 19:39:50.756521 kernel: Key type fscrypt-provisioning registered Apr 12 19:39:50.756528 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 19:39:50.756536 kernel: ima: Allocated hash algorithm: sha1 Apr 12 19:39:50.756544 kernel: ima: No architecture policies found Apr 12 19:39:50.756604 kernel: pcieport 000d:00:01.0: Adding to iommu group 0 Apr 12 19:39:50.756666 kernel: pcieport 000d:00:01.0: AER: enabled with IRQ 91 Apr 12 19:39:50.756727 kernel: pcieport 000d:00:02.0: Adding to iommu group 1 Apr 12 19:39:50.756786 kernel: pcieport 000d:00:02.0: AER: enabled with IRQ 91 Apr 12 19:39:50.756848 kernel: pcieport 000d:00:03.0: Adding to iommu group 2 Apr 12 19:39:50.756908 kernel: pcieport 000d:00:03.0: AER: enabled with IRQ 91 Apr 12 19:39:50.756972 kernel: pcieport 000d:00:04.0: Adding to iommu group 3 Apr 12 19:39:50.757032 kernel: pcieport 000d:00:04.0: AER: enabled with IRQ 91 Apr 12 19:39:50.757096 kernel: pcieport 0000:00:01.0: Adding to iommu group 4 Apr 12 19:39:50.757155 kernel: pcieport 0000:00:01.0: AER: enabled with IRQ 92 Apr 12 19:39:50.757216 kernel: pcieport 0000:00:02.0: Adding to iommu group 5 Apr 12 19:39:50.757277 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 92 Apr 12 19:39:50.757341 kernel: pcieport 0000:00:03.0: Adding to iommu group 6 Apr 12 19:39:50.757402 kernel: pcieport 0000:00:03.0: AER: enabled with IRQ 92 Apr 12 19:39:50.757464 kernel: pcieport 0000:00:04.0: Adding to iommu group 7 Apr 12 19:39:50.757527 kernel: pcieport 0000:00:04.0: AER: enabled with IRQ 92 Apr 12 19:39:50.757589 kernel: pcieport 0005:00:01.0: Adding to iommu group 8 Apr 12 19:39:50.757648 kernel: pcieport 0005:00:01.0: AER: enabled with IRQ 93 Apr 12 19:39:50.757709 kernel: pcieport 0005:00:03.0: Adding to iommu group 9 Apr 12 19:39:50.757768 kernel: pcieport 0005:00:03.0: AER: enabled with IRQ 93 Apr 12 19:39:50.757830 kernel: pcieport 0005:00:05.0: Adding to iommu group 10 Apr 12 19:39:50.757889 kernel: pcieport 0005:00:05.0: AER: enabled with IRQ 93 Apr 12 19:39:50.757951 kernel: pcieport 0005:00:07.0: Adding to iommu group 11 Apr 12 19:39:50.758012 kernel: pcieport 0005:00:07.0: AER: enabled with IRQ 93 Apr 12 19:39:50.758074 kernel: pcieport 0003:00:01.0: Adding to iommu group 12 Apr 12 19:39:50.758133 kernel: pcieport 0003:00:01.0: AER: enabled with IRQ 94 Apr 12 19:39:50.758193 kernel: pcieport 0003:00:03.0: Adding to iommu group 13 Apr 12 19:39:50.758253 kernel: pcieport 0003:00:03.0: AER: enabled with IRQ 94 Apr 12 19:39:50.758316 kernel: pcieport 0003:00:05.0: Adding to iommu group 14 Apr 12 19:39:50.758379 kernel: pcieport 0003:00:05.0: AER: enabled with IRQ 94 Apr 12 19:39:50.758440 kernel: pcieport 000c:00:01.0: Adding to iommu group 15 Apr 12 19:39:50.758502 kernel: pcieport 000c:00:01.0: AER: enabled with IRQ 95 Apr 12 19:39:50.758563 kernel: pcieport 000c:00:02.0: Adding to iommu group 16 Apr 12 19:39:50.758623 kernel: pcieport 000c:00:02.0: AER: enabled with IRQ 95 Apr 12 19:39:50.758683 kernel: pcieport 000c:00:03.0: Adding to iommu group 17 Apr 12 19:39:50.758742 kernel: pcieport 000c:00:03.0: AER: enabled with IRQ 95 Apr 12 19:39:50.758803 kernel: pcieport 000c:00:04.0: Adding to iommu group 18 Apr 12 19:39:50.758861 kernel: pcieport 000c:00:04.0: AER: enabled with IRQ 95 Apr 12 19:39:50.758924 kernel: pcieport 0002:00:01.0: Adding to iommu group 19 Apr 12 19:39:50.758986 kernel: pcieport 0002:00:01.0: AER: enabled with IRQ 96 Apr 12 19:39:50.759047 kernel: pcieport 0002:00:03.0: Adding to iommu group 20 Apr 12 19:39:50.759106 kernel: pcieport 0002:00:03.0: AER: enabled with IRQ 96 Apr 12 19:39:50.759166 kernel: pcieport 0002:00:05.0: Adding to iommu group 21 Apr 12 19:39:50.759227 kernel: pcieport 0002:00:05.0: AER: enabled with IRQ 96 Apr 12 19:39:50.759286 kernel: pcieport 0002:00:07.0: Adding to iommu group 22 Apr 12 19:39:50.759350 kernel: pcieport 0002:00:07.0: AER: enabled with IRQ 96 Apr 12 19:39:50.759411 kernel: pcieport 0001:00:01.0: Adding to iommu group 23 Apr 12 19:39:50.759471 kernel: pcieport 0001:00:01.0: AER: enabled with IRQ 97 Apr 12 19:39:50.759533 kernel: pcieport 0001:00:02.0: Adding to iommu group 24 Apr 12 19:39:50.759594 kernel: pcieport 0001:00:02.0: AER: enabled with IRQ 97 Apr 12 19:39:50.759654 kernel: pcieport 0001:00:03.0: Adding to iommu group 25 Apr 12 19:39:50.759713 kernel: pcieport 0001:00:03.0: AER: enabled with IRQ 97 Apr 12 19:39:50.759775 kernel: pcieport 0001:00:04.0: Adding to iommu group 26 Apr 12 19:39:50.759834 kernel: pcieport 0001:00:04.0: AER: enabled with IRQ 97 Apr 12 19:39:50.759896 kernel: pcieport 0004:00:01.0: Adding to iommu group 27 Apr 12 19:39:50.759956 kernel: pcieport 0004:00:01.0: AER: enabled with IRQ 98 Apr 12 19:39:50.760017 kernel: pcieport 0004:00:03.0: Adding to iommu group 28 Apr 12 19:39:50.760076 kernel: pcieport 0004:00:03.0: AER: enabled with IRQ 98 Apr 12 19:39:50.760136 kernel: pcieport 0004:00:05.0: Adding to iommu group 29 Apr 12 19:39:50.760196 kernel: pcieport 0004:00:05.0: AER: enabled with IRQ 98 Apr 12 19:39:50.760259 kernel: pcieport 0004:01:00.0: Adding to iommu group 30 Apr 12 19:39:50.760269 kernel: Freeing unused kernel memory: 36352K Apr 12 19:39:50.760276 kernel: Run /init as init process Apr 12 19:39:50.760285 kernel: with arguments: Apr 12 19:39:50.760293 kernel: /init Apr 12 19:39:50.760303 kernel: with environment: Apr 12 19:39:50.760310 kernel: HOME=/ Apr 12 19:39:50.760317 kernel: TERM=linux Apr 12 19:39:50.760324 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 19:39:50.760333 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:39:50.760343 systemd[1]: Detected architecture arm64. Apr 12 19:39:50.760352 systemd[1]: Running in initrd. Apr 12 19:39:50.760359 systemd[1]: No hostname configured, using default hostname. Apr 12 19:39:50.760367 systemd[1]: Hostname set to . Apr 12 19:39:50.760374 systemd[1]: Initializing machine ID from random generator. Apr 12 19:39:50.760382 systemd[1]: Queued start job for default target initrd.target. Apr 12 19:39:50.760390 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:39:50.760397 systemd[1]: Reached target cryptsetup.target. Apr 12 19:39:50.760404 systemd[1]: Reached target paths.target. Apr 12 19:39:50.760411 systemd[1]: Reached target slices.target. Apr 12 19:39:50.760420 systemd[1]: Reached target swap.target. Apr 12 19:39:50.760428 systemd[1]: Reached target timers.target. Apr 12 19:39:50.760435 systemd[1]: Listening on iscsid.socket. Apr 12 19:39:50.760443 systemd[1]: Listening on iscsiuio.socket. Apr 12 19:39:50.760450 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 19:39:50.760458 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 19:39:50.760465 systemd[1]: Listening on systemd-journald.socket. Apr 12 19:39:50.760474 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:39:50.760482 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:39:50.760490 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:39:50.760497 systemd[1]: Reached target sockets.target. Apr 12 19:39:50.760505 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:39:50.760512 systemd[1]: Finished network-cleanup.service. Apr 12 19:39:50.760520 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 19:39:50.760527 systemd[1]: Starting systemd-journald.service... Apr 12 19:39:50.760534 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:39:50.760543 systemd[1]: Starting systemd-resolved.service... Apr 12 19:39:50.760550 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 19:39:50.760558 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:39:50.760565 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 19:39:50.760577 systemd-journald[834]: Journal started Apr 12 19:39:50.760620 systemd-journald[834]: Runtime Journal (/run/log/journal/929d440a7dc54f89814ab5e8be22ce6f) is 8.0M, max 4.0G, 3.9G free. Apr 12 19:39:50.700726 systemd-modules-load[835]: Inserted module 'overlay' Apr 12 19:39:50.825814 kernel: audit: type=1130 audit(1712950790.768:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.825831 systemd[1]: Started systemd-resolved.service. Apr 12 19:39:50.825843 kernel: Bridge firewalling registered Apr 12 19:39:50.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.749338 systemd-resolved[836]: Positive Trust Anchors: Apr 12 19:39:50.935633 kernel: SCSI subsystem initialized Apr 12 19:39:50.935646 kernel: audit: type=1130 audit(1712950790.840:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.935656 systemd[1]: Started systemd-journald.service. Apr 12 19:39:50.935666 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 19:39:50.935675 kernel: device-mapper: uevent: version 1.0.3 Apr 12 19:39:50.935684 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 19:39:50.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.749345 systemd-resolved[836]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:39:50.985093 kernel: audit: type=1130 audit(1712950790.940:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.749371 systemd-resolved[836]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:39:51.054483 kernel: audit: type=1130 audit(1712950790.989:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.754652 systemd-resolved[836]: Defaulting to hostname 'linux'. Apr 12 19:39:51.099427 kernel: audit: type=1130 audit(1712950791.059:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.813750 systemd-modules-load[835]: Inserted module 'br_netfilter' Apr 12 19:39:51.149547 kernel: audit: type=1130 audit(1712950791.104:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:50.914142 systemd-modules-load[835]: Inserted module 'dm_multipath' Apr 12 19:39:50.940729 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 19:39:50.990150 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:39:51.059556 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 19:39:51.104572 systemd[1]: Reached target nss-lookup.target. Apr 12 19:39:51.155785 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 19:39:51.239232 kernel: audit: type=1130 audit(1712950791.200:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.166799 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:39:51.282268 kernel: audit: type=1130 audit(1712950791.243:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.177485 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:39:51.334894 kernel: audit: type=1130 audit(1712950791.286:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.192692 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 19:39:51.346106 dracut-cmdline[854]: dracut-dracut-053 Apr 12 19:39:51.346106 dracut-cmdline[854]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=t Apr 12 19:39:51.346106 dracut-cmdline[854]: tyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 19:39:51.201169 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:39:51.243966 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:39:51.288592 systemd[1]: Starting dracut-cmdline.service... Apr 12 19:39:51.423302 kernel: Loading iSCSI transport class v2.0-870. Apr 12 19:39:51.444302 kernel: iscsi: registered transport (tcp) Apr 12 19:39:51.475413 kernel: iscsi: registered transport (qla4xxx) Apr 12 19:39:51.475432 kernel: QLogic iSCSI HBA Driver Apr 12 19:39:51.506460 systemd[1]: Finished dracut-cmdline.service. Apr 12 19:39:51.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:51.516651 systemd[1]: Starting dracut-pre-udev.service... Apr 12 19:39:51.572307 kernel: raid6: neonx8 gen() 13870 MB/s Apr 12 19:39:51.597303 kernel: raid6: neonx8 xor() 10877 MB/s Apr 12 19:39:51.622303 kernel: raid6: neonx4 gen() 13549 MB/s Apr 12 19:39:51.647303 kernel: raid6: neonx4 xor() 11354 MB/s Apr 12 19:39:51.672303 kernel: raid6: neonx2 gen() 13157 MB/s Apr 12 19:39:51.697303 kernel: raid6: neonx2 xor() 10291 MB/s Apr 12 19:39:51.722304 kernel: raid6: neonx1 gen() 10605 MB/s Apr 12 19:39:51.746303 kernel: raid6: neonx1 xor() 8831 MB/s Apr 12 19:39:51.770303 kernel: raid6: int64x8 gen() 6295 MB/s Apr 12 19:39:51.794303 kernel: raid6: int64x8 xor() 3556 MB/s Apr 12 19:39:51.818304 kernel: raid6: int64x4 gen() 7272 MB/s Apr 12 19:39:51.842304 kernel: raid6: int64x4 xor() 3873 MB/s Apr 12 19:39:51.866304 kernel: raid6: int64x2 gen() 6171 MB/s Apr 12 19:39:51.890304 kernel: raid6: int64x2 xor() 3332 MB/s Apr 12 19:39:51.914304 kernel: raid6: int64x1 gen() 5063 MB/s Apr 12 19:39:51.945739 kernel: raid6: int64x1 xor() 2655 MB/s Apr 12 19:39:51.945758 kernel: raid6: using algorithm neonx8 gen() 13870 MB/s Apr 12 19:39:51.945775 kernel: raid6: .... xor() 10877 MB/s, rmw enabled Apr 12 19:39:51.953612 kernel: raid6: using neon recovery algorithm Apr 12 19:39:51.979304 kernel: xor: measuring software checksum speed Apr 12 19:39:51.993778 kernel: 8regs : 17275 MB/sec Apr 12 19:39:51.993788 kernel: 32regs : 20755 MB/sec Apr 12 19:39:52.001143 kernel: arm64_neon : 27873 MB/sec Apr 12 19:39:52.001163 kernel: xor: using function: arm64_neon (27873 MB/sec) Apr 12 19:39:52.068307 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 19:39:52.077613 systemd[1]: Finished dracut-pre-udev.service. Apr 12 19:39:52.140583 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:39:52.140598 kernel: audit: type=1130 audit(1712950792.079:12): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.140608 kernel: audit: type=1334 audit(1712950792.090:13): prog-id=7 op=LOAD Apr 12 19:39:52.140617 kernel: audit: type=1334 audit(1712950792.118:14): prog-id=8 op=LOAD Apr 12 19:39:52.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.090000 audit: BPF prog-id=7 op=LOAD Apr 12 19:39:52.118000 audit: BPF prog-id=8 op=LOAD Apr 12 19:39:52.119325 systemd[1]: Starting systemd-udevd.service... Apr 12 19:39:52.150695 systemd-udevd[1030]: Using default interface naming scheme 'v252'. Apr 12 19:39:52.153987 systemd[1]: Started systemd-udevd.service. Apr 12 19:39:52.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.163017 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 19:39:52.195253 kernel: audit: type=1130 audit(1712950792.160:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.195270 dracut-pre-trigger[1040]: rd.md=0: removing MD RAID activation Apr 12 19:39:52.208947 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 19:39:52.249956 kernel: audit: type=1130 audit(1712950792.212:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.214173 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:39:52.307089 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:39:52.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.354298 kernel: audit: type=1130 audit(1712950792.316:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:52.375546 kernel: ACPI: bus type USB registered Apr 12 19:39:52.375573 kernel: mlx5_core 0001:01:00.0: Adding to iommu group 31 Apr 12 19:39:52.375773 kernel: usbcore: registered new interface driver usbfs Apr 12 19:39:52.376299 kernel: mlx5_core 0001:01:00.0: firmware version: 14.31.1014 Apr 12 19:39:52.396892 kernel: usbcore: registered new interface driver hub Apr 12 19:39:52.402301 kernel: mlx5_core 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 19:39:52.402388 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 19:39:52.402397 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 19:39:52.402405 kernel: igb 0003:03:00.0: Adding to iommu group 32 Apr 12 19:39:52.432777 kernel: usbcore: registered new device driver usb Apr 12 19:39:52.473306 kernel: nvme 0005:03:00.0: Adding to iommu group 33 Apr 12 19:39:52.498300 kernel: xhci_hcd 0004:03:00.0: Adding to iommu group 34 Apr 12 19:39:52.498392 kernel: igb 0003:03:00.0: added PHC on eth0 Apr 12 19:39:52.522703 kernel: igb 0003:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 19:39:52.522771 kernel: igb 0003:03:00.0: eth0: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:0c:6a:c4 Apr 12 19:39:52.544161 kernel: igb 0003:03:00.0: eth0: PBA No: 106300-000 Apr 12 19:39:52.544229 kernel: igb 0003:03:00.0: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 19:39:52.565686 kernel: nvme nvme0: pci function 0005:03:00.0 Apr 12 19:39:52.566449 kernel: igb 0003:03:00.1: Adding to iommu group 35 Apr 12 19:39:52.566527 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 19:39:52.566596 kernel: nvme 0005:04:00.0: Adding to iommu group 36 Apr 12 19:39:52.573934 kernel: nvme nvme0: Shutdown timeout set to 8 seconds Apr 12 19:39:52.613775 kernel: nvme nvme0: 32/0/0 default/read/poll queues Apr 12 19:39:52.613882 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 1 Apr 12 19:39:52.637090 kernel: xhci_hcd 0004:03:00.0: Zeroing 64bit base registers, expecting fault Apr 12 19:39:52.658857 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 19:39:52.658878 kernel: GPT:9289727 != 1875385007 Apr 12 19:39:52.669732 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 19:39:52.678210 kernel: GPT:9289727 != 1875385007 Apr 12 19:39:52.688156 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 19:39:52.697227 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:39:52.749035 kernel: mlx5_core 0001:01:00.0: Port module event: module 0, Cable plugged Apr 12 19:39:52.808302 kernel: mlx5_core 0001:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 19:39:52.808396 kernel: xhci_hcd 0004:03:00.0: hcc params 0x014051cf hci version 0x100 quirks 0x0000001100000410 Apr 12 19:39:52.808467 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 19:39:52.829241 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 2 Apr 12 19:39:52.829387 kernel: xhci_hcd 0004:03:00.0: Host supports USB 3.0 SuperSpeed Apr 12 19:39:52.848587 kernel: nvme nvme1: pci function 0005:04:00.0 Apr 12 19:39:52.848715 kernel: hub 1-0:1.0: USB hub found Apr 12 19:39:52.856448 kernel: nvme nvme1: Shutdown timeout set to 8 seconds Apr 12 19:39:52.856580 kernel: hub 1-0:1.0: 4 ports detected Apr 12 19:39:52.886008 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Apr 12 19:39:52.898308 kernel: nvme nvme1: 32/0/0 default/read/poll queues Apr 12 19:39:52.898420 kernel: hub 2-0:1.0: USB hub found Apr 12 19:39:52.914109 kernel: hub 2-0:1.0: 4 ports detected Apr 12 19:39:52.917650 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 19:39:52.940711 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by (udev-worker) (1077) Apr 12 19:39:52.941760 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 19:39:52.950433 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 19:39:53.035761 kernel: igb 0003:03:00.1: added PHC on eth1 Apr 12 19:39:53.035863 kernel: igb 0003:03:00.1: Intel(R) Gigabit Ethernet Network Connection Apr 12 19:39:53.035930 kernel: igb 0003:03:00.1: eth1: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:0c:6a:c5 Apr 12 19:39:53.035995 kernel: igb 0003:03:00.1: eth1: PBA No: 106300-000 Apr 12 19:39:53.036059 kernel: igb 0003:03:00.1: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 19:39:53.036124 kernel: igb 0003:03:00.1 eno2: renamed from eth1 Apr 12 19:39:53.036187 kernel: igb 0003:03:00.0 eno1: renamed from eth0 Apr 12 19:39:52.958106 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 19:39:53.046401 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:39:53.053860 systemd[1]: Starting disk-uuid.service... Apr 12 19:39:53.082484 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:39:53.082495 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:39:53.082589 disk-uuid[1131]: Primary Header is updated. Apr 12 19:39:53.082589 disk-uuid[1131]: Secondary Entries is updated. Apr 12 19:39:53.082589 disk-uuid[1131]: Secondary Header is updated. Apr 12 19:39:53.103777 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:39:53.153308 kernel: usb 1-3: new high-speed USB device number 2 using xhci_hcd Apr 12 19:39:53.243302 kernel: mlx5_core 0001:01:00.1: Adding to iommu group 37 Apr 12 19:39:53.243411 kernel: mlx5_core 0001:01:00.1: firmware version: 14.31.1014 Apr 12 19:39:53.277501 kernel: mlx5_core 0001:01:00.1: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 19:39:53.307306 kernel: hub 1-3:1.0: USB hub found Apr 12 19:39:53.316298 kernel: hub 1-3:1.0: 4 ports detected Apr 12 19:39:53.418305 kernel: usb 2-3: new SuperSpeed USB device number 2 using xhci_hcd Apr 12 19:39:53.446305 kernel: hub 2-3:1.0: USB hub found Apr 12 19:39:53.446490 kernel: hub 2-3:1.0: 4 ports detected Apr 12 19:39:53.623528 kernel: mlx5_core 0001:01:00.1: Port module event: module 1, Cable plugged Apr 12 19:39:53.667306 kernel: mlx5_core 0001:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 19:39:54.003306 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: renamed from eth1 Apr 12 19:39:54.020305 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: renamed from eth0 Apr 12 19:39:54.093083 disk-uuid[1132]: The operation has completed successfully. Apr 12 19:39:54.097648 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:39:54.116384 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 19:39:54.187740 kernel: audit: type=1130 audit(1712950794.120:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.187757 kernel: audit: type=1131 audit(1712950794.120:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.116466 systemd[1]: Finished disk-uuid.service. Apr 12 19:39:54.208053 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 19:39:54.127805 systemd[1]: Starting verity-setup.service... Apr 12 19:39:54.219049 systemd[1]: Found device dev-mapper-usr.device. Apr 12 19:39:54.228944 systemd[1]: Mounting sysusr-usr.mount... Apr 12 19:39:54.238372 systemd[1]: Finished verity-setup.service. Apr 12 19:39:54.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.296959 systemd[1]: Mounted sysusr-usr.mount. Apr 12 19:39:54.301515 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:39:54.306179 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 19:39:54.307359 systemd[1]: Starting ignition-setup.service... Apr 12 19:39:54.371427 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 19:39:54.371442 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 19:39:54.371452 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 19:39:54.371460 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 19:39:54.367803 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 19:39:54.378880 systemd[1]: Finished ignition-setup.service. Apr 12 19:39:54.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.388648 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 19:39:54.454069 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 19:39:54.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.459000 audit: BPF prog-id=9 op=LOAD Apr 12 19:39:54.461499 systemd[1]: Starting systemd-networkd.service... Apr 12 19:39:54.461314 ignition[1371]: Ignition 2.14.0 Apr 12 19:39:54.461320 ignition[1371]: Stage: fetch-offline Apr 12 19:39:54.461435 ignition[1371]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:39:54.461454 ignition[1371]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:39:54.465852 ignition[1371]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:39:54.465959 ignition[1371]: parsed url from cmdline: "" Apr 12 19:39:54.490457 systemd-networkd[1497]: lo: Link UP Apr 12 19:39:54.465962 ignition[1371]: no config URL provided Apr 12 19:39:54.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.490460 systemd-networkd[1497]: lo: Gained carrier Apr 12 19:39:54.465967 ignition[1371]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:39:54.490917 systemd-networkd[1497]: Enumeration completed Apr 12 19:39:54.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.466037 ignition[1371]: parsing config with SHA512: 5a70f16c755f7bbd1157729836c2482e3d069817a5192bca9f371f24514674e4494d6ceb42776b3f34d216444062b9d40b9d8736b44f70baa65fed5bbb783fd7 Apr 12 19:39:54.490991 systemd[1]: Started systemd-networkd.service. Apr 12 19:39:54.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.501785 ignition[1371]: fetch-offline: fetch-offline passed Apr 12 19:39:54.491640 systemd-networkd[1497]: enP1p1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:39:54.501790 ignition[1371]: POST message to Packet Timeline Apr 12 19:39:54.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.499899 systemd[1]: Reached target network.target. Apr 12 19:39:54.501794 ignition[1371]: POST Status error: resource requires networking Apr 12 19:39:54.582877 iscsid[1531]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:39:54.582877 iscsid[1531]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 19:39:54.582877 iscsid[1531]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 19:39:54.582877 iscsid[1531]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 19:39:54.582877 iscsid[1531]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 19:39:54.582877 iscsid[1531]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:39:54.582877 iscsid[1531]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 19:39:54.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:39:54.501175 unknown[1371]: fetched base config from "system" Apr 12 19:39:54.501846 ignition[1371]: Ignition finished successfully Apr 12 19:39:54.501182 unknown[1371]: fetched user config from "system" Apr 12 19:39:54.548631 ignition[1525]: Ignition 2.14.0 Apr 12 19:39:54.509390 systemd[1]: Starting iscsiuio.service... Apr 12 19:39:54.548637 ignition[1525]: Stage: kargs Apr 12 19:39:54.517152 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 19:39:54.548746 ignition[1525]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:39:54.525642 systemd[1]: Started iscsiuio.service. Apr 12 19:39:54.548762 ignition[1525]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:39:54.534331 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 19:39:54.553493 ignition[1525]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:39:54.535910 systemd[1]: Starting ignition-kargs.service... Apr 12 19:39:54.554694 ignition[1525]: kargs: kargs passed Apr 12 19:39:54.544852 systemd[1]: Starting iscsid.service... Apr 12 19:39:54.554699 ignition[1525]: POST message to Packet Timeline Apr 12 19:39:54.559109 systemd[1]: Started iscsid.service. Apr 12 19:39:54.554716 ignition[1525]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:39:54.566366 systemd[1]: Starting dracut-initqueue.service... Apr 12 19:39:54.557833 ignition[1525]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60660->[::1]:53: read: connection refused Apr 12 19:39:54.586041 systemd[1]: Finished dracut-initqueue.service. Apr 12 19:39:54.758566 ignition[1525]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 19:39:54.596422 systemd[1]: Reached target remote-fs-pre.target. Apr 12 19:39:54.759036 ignition[1525]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33400->[::1]:53: read: connection refused Apr 12 19:39:54.614205 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:39:54.632867 systemd[1]: Reached target remote-fs.target. Apr 12 19:39:54.643877 systemd[1]: Starting dracut-pre-mount.service... Apr 12 19:39:54.657526 systemd[1]: Finished dracut-pre-mount.service. Apr 12 19:39:55.160373 ignition[1525]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 19:39:55.160758 ignition[1525]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42282->[::1]:53: read: connection refused Apr 12 19:39:55.271309 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 19:39:55.276713 systemd-networkd[1497]: enP1p1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:39:55.295645 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f1np1: link becomes ready Apr 12 19:39:55.961137 ignition[1525]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 19:39:55.961757 ignition[1525]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50675->[::1]:53: read: connection refused Apr 12 19:39:56.230310 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 19:39:56.233950 systemd-networkd[1497]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:39:56.286537 systemd-networkd[1497]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:39:56.308151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f0np0: link becomes ready Apr 12 19:39:56.350416 systemd-networkd[1497]: enP1p1s0f1np1: Link UP Apr 12 19:39:56.350560 systemd-networkd[1497]: enP1p1s0f1np1: Gained carrier Apr 12 19:39:56.359492 systemd-networkd[1497]: enP1p1s0f0np0: Link UP Apr 12 19:39:56.359647 systemd-networkd[1497]: eno2: Link UP Apr 12 19:39:56.359769 systemd-networkd[1497]: enP1p1s0f0np0: Gained carrier Apr 12 19:39:56.371414 systemd-networkd[1497]: eno1: Link UP Apr 12 19:39:56.407340 systemd-networkd[1497]: enP1p1s0f0np0: DHCPv4 address 147.75.62.230/30, gateway 147.75.62.229 acquired from 147.28.144.140 Apr 12 19:39:57.467538 systemd-networkd[1497]: enP1p1s0f1np1: Gained IPv6LL Apr 12 19:39:57.562153 ignition[1525]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 19:39:57.562759 ignition[1525]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48767->[::1]:53: read: connection refused Apr 12 19:39:57.787529 systemd-networkd[1497]: enP1p1s0f0np0: Gained IPv6LL Apr 12 19:40:00.764653 ignition[1525]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 19:40:00.794991 ignition[1525]: GET result: OK Apr 12 19:40:00.935464 ignition[1525]: Ignition finished successfully Apr 12 19:40:00.937981 systemd[1]: Finished ignition-kargs.service. Apr 12 19:40:00.995095 kernel: kauditd_printk_skb: 10 callbacks suppressed Apr 12 19:40:00.995119 kernel: audit: type=1130 audit(1712950800.940:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:00.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:00.953811 ignition[1558]: Ignition 2.14.0 Apr 12 19:40:00.942348 systemd[1]: Starting ignition-disks.service... Apr 12 19:40:00.953817 ignition[1558]: Stage: disks Apr 12 19:40:00.953916 ignition[1558]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:40:00.953939 ignition[1558]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:40:00.955959 ignition[1558]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:40:00.957141 ignition[1558]: disks: disks passed Apr 12 19:40:00.957172 ignition[1558]: POST message to Packet Timeline Apr 12 19:40:00.957196 ignition[1558]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:40:00.986118 ignition[1558]: GET result: OK Apr 12 19:40:01.117349 ignition[1558]: Ignition finished successfully Apr 12 19:40:01.118481 systemd[1]: Finished ignition-disks.service. Apr 12 19:40:01.162522 kernel: audit: type=1130 audit(1712950801.125:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.126110 systemd[1]: Reached target initrd-root-device.target. Apr 12 19:40:01.167102 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:40:01.176398 systemd[1]: Reached target local-fs.target. Apr 12 19:40:01.185520 systemd[1]: Reached target sysinit.target. Apr 12 19:40:01.194652 systemd[1]: Reached target basic.target. Apr 12 19:40:01.205045 systemd[1]: Starting systemd-fsck-root.service... Apr 12 19:40:01.222057 systemd-fsck[1575]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 19:40:01.224580 systemd[1]: Finished systemd-fsck-root.service. Apr 12 19:40:01.287695 kernel: audit: type=1130 audit(1712950801.231:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.287732 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:40:01.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.234716 systemd[1]: Mounting sysroot.mount... Apr 12 19:40:01.294213 systemd[1]: Mounted sysroot.mount. Apr 12 19:40:01.301571 systemd[1]: Reached target initrd-root-fs.target. Apr 12 19:40:01.311974 systemd[1]: Mounting sysroot-usr.mount... Apr 12 19:40:01.321525 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 19:40:01.330700 systemd[1]: Starting flatcar-static-network.service... Apr 12 19:40:01.338538 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 19:40:01.338579 systemd[1]: Reached target ignition-diskful.target. Apr 12 19:40:01.349877 systemd[1]: Mounted sysroot-usr.mount. Apr 12 19:40:01.433618 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/nvme0n1p6 scanned by mount (1589) Apr 12 19:40:01.433633 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 19:40:01.433643 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 19:40:01.433652 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 19:40:01.433664 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 19:40:01.433684 coreos-metadata[1584]: Apr 12 19:40:01.400 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:40:01.433684 coreos-metadata[1584]: Apr 12 19:40:01.422 INFO Fetch successful Apr 12 19:40:01.363184 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:40:01.499421 kernel: audit: type=1130 audit(1712950801.460:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.499465 coreos-metadata[1583]: Apr 12 19:40:01.400 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:40:01.499465 coreos-metadata[1583]: Apr 12 19:40:01.423 INFO Fetch successful Apr 12 19:40:01.499465 coreos-metadata[1583]: Apr 12 19:40:01.454 INFO wrote hostname ci-3510.3.3-a-f02954802e to /sysroot/etc/hostname Apr 12 19:40:01.649999 kernel: audit: type=1130 audit(1712950801.503:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.650017 kernel: audit: type=1130 audit(1712950801.552:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.650027 kernel: audit: type=1131 audit(1712950801.552:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.371818 systemd[1]: Starting initrd-setup-root.service... Apr 12 19:40:01.440781 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:40:01.667007 initrd-setup-root[1612]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 19:40:01.718293 kernel: audit: type=1130 audit(1712950801.672:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.451907 systemd[1]: Finished initrd-setup-root.service. Apr 12 19:40:01.723674 initrd-setup-root[1620]: cut: /sysroot/etc/group: No such file or directory Apr 12 19:40:01.461319 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 19:40:01.734289 initrd-setup-root[1628]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 19:40:01.739648 ignition[1659]: INFO : Ignition 2.14.0 Apr 12 19:40:01.739648 ignition[1659]: INFO : Stage: mount Apr 12 19:40:01.739648 ignition[1659]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:40:01.739648 ignition[1659]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:40:01.739648 ignition[1659]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:40:01.739648 ignition[1659]: INFO : mount: mount passed Apr 12 19:40:01.739648 ignition[1659]: INFO : POST message to Packet Timeline Apr 12 19:40:01.739648 ignition[1659]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:40:01.739648 ignition[1659]: INFO : GET result: OK Apr 12 19:40:01.504183 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 19:40:01.805526 initrd-setup-root[1636]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 19:40:01.504250 systemd[1]: Finished flatcar-static-network.service. Apr 12 19:40:01.553996 systemd[1]: Starting ignition-mount.service... Apr 12 19:40:01.640973 systemd[1]: Starting sysroot-boot.service... Apr 12 19:40:01.657112 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 19:40:01.872902 kernel: audit: type=1130 audit(1712950801.829:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:01.872945 ignition[1659]: INFO : Ignition finished successfully Apr 12 19:40:01.657327 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 19:40:01.950643 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/nvme0n1p6 scanned by mount (1676) Apr 12 19:40:01.950658 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 19:40:01.950667 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 19:40:01.950676 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 19:40:01.950687 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 19:40:01.666005 systemd[1]: Finished sysroot-boot.service. Apr 12 19:40:01.824127 systemd[1]: Finished ignition-mount.service. Apr 12 19:40:01.830882 systemd[1]: Starting ignition-files.service... Apr 12 19:40:01.969347 ignition[1695]: INFO : Ignition 2.14.0 Apr 12 19:40:01.969347 ignition[1695]: INFO : Stage: files Apr 12 19:40:01.969347 ignition[1695]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:40:01.969347 ignition[1695]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:40:01.882196 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:40:02.000112 ignition[1695]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:40:02.000112 ignition[1695]: DEBUG : files: compiled without relabeling support, skipping Apr 12 19:40:02.000112 ignition[1695]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 19:40:02.000112 ignition[1695]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 19:40:02.000112 ignition[1695]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 19:40:02.000112 ignition[1695]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 19:40:02.000112 ignition[1695]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 19:40:02.000112 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 19:40:02.000112 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 19:40:01.893159 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:40:01.976562 unknown[1695]: wrote ssh authorized keys file for user: core Apr 12 19:40:02.270464 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 19:40:02.357578 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 19:40:02.367949 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 19:40:02.367949 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 19:40:02.482627 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 19:40:02.719254 ignition[1695]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 19:40:02.737240 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 19:40:02.737240 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 19:40:02.737240 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 19:40:02.810018 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 19:40:02.933205 ignition[1695]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 19:40:02.951472 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 19:40:02.951472 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:40:02.951472 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 19:40:02.987899 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 19:40:03.242913 ignition[1695]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3e6beeb7794aa002604f0be43af0255e707846760508ebe98006ec72ae8d7a7cf2c14fd52bbcc5084f0e9366b992dc64341b1da646f1ce6e937fb762f880dc15 Apr 12 19:40:03.261914 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:40:03.261914 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:40:03.261914 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 19:40:03.299299 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 19:40:03.877038 ignition[1695]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ded47d757fac0279b1b784756fb54b3a5cb0180ce45833838b00d6d7c87578a985e4627503dd7ff734e5f577cf4752ae7daaa2b68e5934fd4617ea15e995f91b Apr 12 19:40:03.895752 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:40:03.895752 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 19:40:03.895752 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubectl: attempt #1 Apr 12 19:40:03.933101 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 19:40:04.215851 ignition[1695]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: b303598f3a65bbc366a7bfb4632d3b5cdd2d41b8a7973de80a99f8b1bb058299b57dc39b17a53eb7a54f1a0479ae4e2093fec675f1baff4613e14e0ed9d65c21 Apr 12 19:40:04.258022 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1695) Apr 12 19:40:04.226421 systemd[1]: mnt-oem3108125263.mount: Deactivated successfully. Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:40:04.264344 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3108125263" Apr 12 19:40:04.523328 kernel: audit: type=1130 audit(1712950804.399:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.393877 systemd[1]: Finished ignition-files.service. Apr 12 19:40:04.535644 ignition[1695]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3108125263": device or resource busy Apr 12 19:40:04.535644 ignition[1695]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3108125263", trying btrfs: device or resource busy Apr 12 19:40:04.535644 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3108125263" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3108125263" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3108125263" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3108125263" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Apr 12 19:40:04.535644 ignition[1695]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:40:04.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.402275 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-helm.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1e): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1e): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:40:04.834165 ignition[1695]: INFO : files: files passed Apr 12 19:40:04.834165 ignition[1695]: INFO : POST message to Packet Timeline Apr 12 19:40:04.834165 ignition[1695]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:40:04.834165 ignition[1695]: INFO : GET result: OK Apr 12 19:40:04.834165 ignition[1695]: INFO : Ignition finished successfully Apr 12 19:40:04.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.456996 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 19:40:05.203577 initrd-setup-root-after-ignition[1734]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 19:40:05.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.219464 iscsid[1531]: iscsid shutting down. Apr 12 19:40:05.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.458502 systemd[1]: Starting ignition-quench.service... Apr 12 19:40:04.475909 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 19:40:04.493629 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 19:40:04.493691 systemd[1]: Finished ignition-quench.service. Apr 12 19:40:04.511512 systemd[1]: Reached target ignition-complete.target. Apr 12 19:40:05.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.530597 systemd[1]: Starting initrd-parse-etc.service... Apr 12 19:40:05.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.555272 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 19:40:05.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.300341 ignition[1749]: INFO : Ignition 2.14.0 Apr 12 19:40:05.300341 ignition[1749]: INFO : Stage: umount Apr 12 19:40:05.300341 ignition[1749]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:40:05.300341 ignition[1749]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:40:05.300341 ignition[1749]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:40:05.300341 ignition[1749]: INFO : umount: umount passed Apr 12 19:40:05.300341 ignition[1749]: INFO : POST message to Packet Timeline Apr 12 19:40:05.300341 ignition[1749]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:40:05.300341 ignition[1749]: INFO : GET result: OK Apr 12 19:40:05.300341 ignition[1749]: INFO : Ignition finished successfully Apr 12 19:40:05.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.304000 audit: BPF prog-id=6 op=UNLOAD Apr 12 19:40:05.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.555443 systemd[1]: Finished initrd-parse-etc.service. Apr 12 19:40:04.577635 systemd[1]: Reached target initrd-fs.target. Apr 12 19:40:05.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.594483 systemd[1]: Reached target initrd.target. Apr 12 19:40:04.611676 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 19:40:04.613066 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 19:40:05.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.633511 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 19:40:05.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.648384 systemd[1]: Starting initrd-cleanup.service... Apr 12 19:40:05.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.670456 systemd[1]: Stopped target nss-lookup.target. Apr 12 19:40:04.680791 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 19:40:05.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.697625 systemd[1]: Stopped target timers.target. Apr 12 19:40:05.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.713902 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 19:40:05.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.713989 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 19:40:05.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:05.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:04.730248 systemd[1]: Stopped target initrd.target. Apr 12 19:40:04.746430 systemd[1]: Stopped target basic.target. Apr 12 19:40:04.762837 systemd[1]: Stopped target ignition-complete.target. Apr 12 19:40:04.779378 systemd[1]: Stopped target ignition-diskful.target. Apr 12 19:40:04.795896 systemd[1]: Stopped target initrd-root-device.target. Apr 12 19:40:04.812213 systemd[1]: Stopped target remote-fs.target. Apr 12 19:40:04.828624 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 19:40:04.839563 systemd[1]: Stopped target sysinit.target. Apr 12 19:40:04.856116 systemd[1]: Stopped target local-fs.target. Apr 12 19:40:04.872605 systemd[1]: Stopped target local-fs-pre.target. Apr 12 19:40:04.889108 systemd[1]: Stopped target swap.target. Apr 12 19:40:04.905775 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 19:40:04.905859 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 19:40:04.922709 systemd[1]: Stopped target cryptsetup.target. Apr 12 19:40:04.939544 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 19:40:04.939620 systemd[1]: Stopped dracut-initqueue.service. Apr 12 19:40:04.956645 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 19:40:04.956722 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 19:40:04.973500 systemd[1]: Stopped target paths.target. Apr 12 19:40:04.990027 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 19:40:04.991315 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 19:40:05.006735 systemd[1]: Stopped target slices.target. Apr 12 19:40:05.023348 systemd[1]: Stopped target sockets.target. Apr 12 19:40:05.039939 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 19:40:05.040021 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 19:40:05.056427 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 19:40:05.056503 systemd[1]: Stopped ignition-files.service. Apr 12 19:40:05.072806 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 19:40:05.072883 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 19:40:05.091146 systemd[1]: Stopping ignition-mount.service... Apr 12 19:40:05.106489 systemd[1]: Stopping iscsid.service... Apr 12 19:40:05.124594 systemd[1]: Stopping sysroot-boot.service... Apr 12 19:40:05.139519 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 19:40:05.139685 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 19:40:05.150352 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 19:40:05.150430 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 19:40:05.164175 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 19:40:05.164864 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 19:40:05.164977 systemd[1]: Stopped iscsid.service. Apr 12 19:40:05.172309 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 19:40:05.172383 systemd[1]: Closed iscsid.socket. Apr 12 19:40:05.182570 systemd[1]: Stopping iscsiuio.service... Apr 12 19:40:05.193236 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 19:40:05.193314 systemd[1]: Stopped iscsiuio.service. Apr 12 19:40:05.209017 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 19:40:05.209081 systemd[1]: Finished initrd-cleanup.service. Apr 12 19:40:05.225694 systemd[1]: Stopped target network.target. Apr 12 19:40:05.235082 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 19:40:05.235151 systemd[1]: Closed iscsiuio.socket. Apr 12 19:40:05.245412 systemd[1]: Stopping systemd-networkd.service... Apr 12 19:40:05.255610 systemd[1]: Stopping systemd-resolved.service... Apr 12 19:40:05.256323 systemd-networkd[1497]: enP1p1s0f1np1: DHCPv6 lease lost Apr 12 19:40:05.265380 systemd-networkd[1497]: enP1p1s0f0np0: DHCPv6 lease lost Apr 12 19:40:05.723000 audit: BPF prog-id=9 op=UNLOAD Apr 12 19:40:05.265852 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 19:40:05.265929 systemd[1]: Stopped systemd-resolved.service. Apr 12 19:40:05.276616 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 19:40:05.276691 systemd[1]: Stopped systemd-networkd.service. Apr 12 19:40:05.286249 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 19:40:05.286319 systemd[1]: Stopped ignition-mount.service. Apr 12 19:40:05.295605 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 19:40:05.295667 systemd[1]: Stopped sysroot-boot.service. Apr 12 19:40:05.305413 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 19:40:05.305438 systemd[1]: Closed systemd-networkd.socket. Apr 12 19:40:05.314897 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 19:40:05.314929 systemd[1]: Stopped ignition-disks.service. Apr 12 19:40:05.324447 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 19:40:05.324478 systemd[1]: Stopped ignition-kargs.service. Apr 12 19:40:05.338920 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 19:40:05.338966 systemd[1]: Stopped ignition-setup.service. Apr 12 19:40:05.353518 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 19:40:05.353548 systemd[1]: Stopped initrd-setup-root.service. Apr 12 19:40:05.369492 systemd[1]: Stopping network-cleanup.service... Apr 12 19:40:05.378330 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 19:40:05.378419 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 19:40:05.388218 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 19:40:05.388284 systemd[1]: Stopped systemd-sysctl.service. Apr 12 19:40:05.397900 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 19:40:05.397930 systemd[1]: Stopped systemd-modules-load.service. Apr 12 19:40:05.407686 systemd[1]: Stopping systemd-udevd.service... Apr 12 19:40:05.419499 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 19:40:05.420097 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 19:40:05.420208 systemd[1]: Stopped systemd-udevd.service. Apr 12 19:40:05.429801 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 19:40:05.429885 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 19:40:05.437450 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 19:40:05.437481 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 19:40:05.447199 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 19:40:05.447232 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 19:40:05.462066 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 19:40:05.462143 systemd[1]: Stopped dracut-cmdline.service. Apr 12 19:40:05.471806 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 19:40:05.471834 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 19:40:05.483002 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 19:40:05.491878 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 19:40:05.491935 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 19:40:05.501899 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 19:40:05.501931 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 19:40:05.511109 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 19:40:05.511151 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 19:40:05.522687 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 19:40:05.523337 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 19:40:05.523415 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 19:40:06.148238 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 19:40:06.148338 systemd[1]: Stopped network-cleanup.service. Apr 12 19:40:06.208661 kernel: kauditd_printk_skb: 41 callbacks suppressed Apr 12 19:40:06.208680 kernel: audit: type=1131 audit(1712950806.156:81): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:06.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:06.157085 systemd[1]: Reached target initrd-switch-root.target. Apr 12 19:40:06.214550 systemd[1]: Starting initrd-switch-root.service... Apr 12 19:40:06.227349 systemd[1]: Switching root. Apr 12 19:40:06.265671 systemd-journald[834]: Journal stopped Apr 12 19:40:09.416702 systemd-journald[834]: Received SIGTERM from PID 1 (systemd). Apr 12 19:40:09.416725 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 19:40:09.416736 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 19:40:09.416745 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 19:40:09.416752 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 19:40:09.416760 kernel: SELinux: policy capability open_perms=1 Apr 12 19:40:09.416769 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 19:40:09.416779 kernel: SELinux: policy capability always_check_network=0 Apr 12 19:40:09.416787 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 19:40:09.416794 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 19:40:09.416802 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 19:40:09.416810 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 19:40:09.416819 kernel: audit: type=1403 audit(1712950806.444:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:40:09.416828 systemd[1]: Successfully loaded SELinux policy in 144.260ms. Apr 12 19:40:09.416840 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.506ms. Apr 12 19:40:09.416851 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:40:09.416860 systemd[1]: Detected architecture arm64. Apr 12 19:40:09.416869 systemd[1]: Detected first boot. Apr 12 19:40:09.416878 systemd[1]: Hostname set to . Apr 12 19:40:09.416888 systemd[1]: Initializing machine ID from random generator. Apr 12 19:40:09.416898 kernel: audit: type=1400 audit(1712950806.611:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:40:09.416907 kernel: audit: type=1400 audit(1712950806.655:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:40:09.416917 kernel: audit: type=1400 audit(1712950806.655:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:40:09.416925 kernel: audit: type=1334 audit(1712950806.688:86): prog-id=10 op=LOAD Apr 12 19:40:09.416934 kernel: audit: type=1334 audit(1712950806.688:87): prog-id=10 op=UNLOAD Apr 12 19:40:09.416943 kernel: audit: type=1334 audit(1712950806.722:88): prog-id=11 op=LOAD Apr 12 19:40:09.416952 kernel: audit: type=1334 audit(1712950806.722:89): prog-id=11 op=UNLOAD Apr 12 19:40:09.416960 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 19:40:09.416969 kernel: audit: type=1400 audit(1712950806.770:90): avc: denied { associate } for pid=1795 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:40:09.416978 systemd[1]: Populated /etc with preset unit settings. Apr 12 19:40:09.416987 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:40:09.416997 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:40:09.417008 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:40:09.417018 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 19:40:09.417027 systemd[1]: Stopped initrd-switch-root.service. Apr 12 19:40:09.417036 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 19:40:09.417045 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 19:40:09.417055 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 19:40:09.417064 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 19:40:09.417074 systemd[1]: Created slice system-getty.slice. Apr 12 19:40:09.417085 systemd[1]: Created slice system-modprobe.slice. Apr 12 19:40:09.417096 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 19:40:09.417105 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 19:40:09.417115 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 19:40:09.417124 systemd[1]: Created slice user.slice. Apr 12 19:40:09.417133 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:40:09.417142 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 19:40:09.417151 systemd[1]: Set up automount boot.automount. Apr 12 19:40:09.417160 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 19:40:09.417171 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 19:40:09.417180 systemd[1]: Stopped target initrd-fs.target. Apr 12 19:40:09.417189 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 19:40:09.417198 systemd[1]: Reached target integritysetup.target. Apr 12 19:40:09.417207 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:40:09.417217 systemd[1]: Reached target remote-fs.target. Apr 12 19:40:09.417226 systemd[1]: Reached target slices.target. Apr 12 19:40:09.417235 systemd[1]: Reached target swap.target. Apr 12 19:40:09.417245 systemd[1]: Reached target torcx.target. Apr 12 19:40:09.417255 systemd[1]: Reached target veritysetup.target. Apr 12 19:40:09.417264 systemd[1]: Listening on systemd-coredump.socket. Apr 12 19:40:09.417273 systemd[1]: Listening on systemd-initctl.socket. Apr 12 19:40:09.417282 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:40:09.417292 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:40:09.417305 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:40:09.417314 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 19:40:09.417324 systemd[1]: Mounting dev-hugepages.mount... Apr 12 19:40:09.417333 systemd[1]: Mounting dev-mqueue.mount... Apr 12 19:40:09.417342 systemd[1]: Mounting media.mount... Apr 12 19:40:09.417352 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 19:40:09.417361 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 19:40:09.417371 systemd[1]: Mounting tmp.mount... Apr 12 19:40:09.417380 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 19:40:09.417390 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 19:40:09.417399 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:40:09.417409 systemd[1]: Starting modprobe@configfs.service... Apr 12 19:40:09.417418 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 19:40:09.417427 systemd[1]: Starting modprobe@drm.service... Apr 12 19:40:09.417436 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 19:40:09.417445 systemd[1]: Starting modprobe@fuse.service... Apr 12 19:40:09.417455 kernel: fuse: init (API version 7.34) Apr 12 19:40:09.417464 systemd[1]: Starting modprobe@loop.service... Apr 12 19:40:09.417474 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 19:40:09.417483 kernel: loop: module loaded Apr 12 19:40:09.417492 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 19:40:09.417502 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 19:40:09.417511 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 19:40:09.417520 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 19:40:09.417530 systemd[1]: Stopped systemd-journald.service. Apr 12 19:40:09.417541 systemd[1]: systemd-journald.service: Consumed 4.341s CPU time. Apr 12 19:40:09.417550 systemd[1]: Starting systemd-journald.service... Apr 12 19:40:09.417559 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:40:09.417569 systemd[1]: Starting systemd-network-generator.service... Apr 12 19:40:09.417580 systemd-journald[1912]: Journal started Apr 12 19:40:09.417618 systemd-journald[1912]: Runtime Journal (/run/log/journal/0066cfb674c34f13831c3bec93fdbf0a) is 8.0M, max 4.0G, 3.9G free. Apr 12 19:40:06.444000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:40:06.611000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:40:06.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:40:06.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:40:06.688000 audit: BPF prog-id=10 op=LOAD Apr 12 19:40:06.688000 audit: BPF prog-id=10 op=UNLOAD Apr 12 19:40:06.722000 audit: BPF prog-id=11 op=LOAD Apr 12 19:40:06.722000 audit: BPF prog-id=11 op=UNLOAD Apr 12 19:40:06.770000 audit[1795]: AVC avc: denied { associate } for pid=1795 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:40:06.770000 audit[1795]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40002d189c a1=40001cadf8 a2=40001d10c0 a3=32 items=0 ppid=1777 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:06.770000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:40:06.790000 audit[1795]: AVC avc: denied { associate } for pid=1795 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 19:40:06.790000 audit[1795]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40002d1979 a2=1ed a3=0 items=2 ppid=1777 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:06.790000 audit: CWD cwd="/" Apr 12 19:40:06.790000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:06.790000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:06.790000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:40:08.543000 audit: BPF prog-id=12 op=LOAD Apr 12 19:40:08.543000 audit: BPF prog-id=3 op=UNLOAD Apr 12 19:40:08.543000 audit: BPF prog-id=13 op=LOAD Apr 12 19:40:08.543000 audit: BPF prog-id=14 op=LOAD Apr 12 19:40:08.543000 audit: BPF prog-id=4 op=UNLOAD Apr 12 19:40:08.543000 audit: BPF prog-id=5 op=UNLOAD Apr 12 19:40:08.544000 audit: BPF prog-id=15 op=LOAD Apr 12 19:40:08.544000 audit: BPF prog-id=12 op=UNLOAD Apr 12 19:40:08.544000 audit: BPF prog-id=16 op=LOAD Apr 12 19:40:08.544000 audit: BPF prog-id=17 op=LOAD Apr 12 19:40:08.544000 audit: BPF prog-id=13 op=UNLOAD Apr 12 19:40:08.544000 audit: BPF prog-id=14 op=UNLOAD Apr 12 19:40:08.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:08.569000 audit: BPF prog-id=15 op=UNLOAD Apr 12 19:40:08.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:08.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.378000 audit: BPF prog-id=18 op=LOAD Apr 12 19:40:09.378000 audit: BPF prog-id=19 op=LOAD Apr 12 19:40:09.378000 audit: BPF prog-id=20 op=LOAD Apr 12 19:40:09.378000 audit: BPF prog-id=16 op=UNLOAD Apr 12 19:40:09.378000 audit: BPF prog-id=17 op=UNLOAD Apr 12 19:40:09.412000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 19:40:09.412000 audit[1912]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=fffff6a4cdf0 a2=4000 a3=1 items=0 ppid=1 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:09.412000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 19:40:08.540987 systemd[1]: Queued start job for default target multi-user.target. Apr 12 19:40:06.768876 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:40:08.545696 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 19:40:06.769138 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:40:08.546037 systemd[1]: systemd-journald.service: Consumed 4.341s CPU time. Apr 12 19:40:06.769155 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:40:06.769186 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 19:40:06.769196 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 19:40:06.769219 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 19:40:06.769230 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 19:40:06.769426 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 19:40:06.769458 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:40:06.769470 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:40:06.770301 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 19:40:06.770333 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 19:40:06.770354 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 19:40:06.770368 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 19:40:06.770386 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 19:40:06.770399 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 19:40:08.179248 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:08Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:40:08.179537 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:08Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:40:08.180076 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:08Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:40:08.180292 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:08Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:40:08.180365 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:08Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 19:40:08.180429 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2024-04-12T19:40:08Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 19:40:09.438309 systemd[1]: Starting systemd-remount-fs.service... Apr 12 19:40:09.454311 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:40:09.477831 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 19:40:09.477847 systemd[1]: Stopped verity-setup.service. Apr 12 19:40:09.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.493311 systemd[1]: Started systemd-journald.service. Apr 12 19:40:09.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.497809 systemd[1]: Mounted dev-hugepages.mount. Apr 12 19:40:09.502062 systemd[1]: Mounted dev-mqueue.mount. Apr 12 19:40:09.506254 systemd[1]: Mounted media.mount. Apr 12 19:40:09.510339 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 19:40:09.514415 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 19:40:09.518419 systemd[1]: Mounted tmp.mount. Apr 12 19:40:09.522490 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 19:40:09.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.526619 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:40:09.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.530640 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 19:40:09.530756 systemd[1]: Finished modprobe@configfs.service. Apr 12 19:40:09.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.534853 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 19:40:09.534965 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 19:40:09.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.538965 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 19:40:09.539110 systemd[1]: Finished modprobe@drm.service. Apr 12 19:40:09.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.542798 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 19:40:09.542932 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 19:40:09.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.546668 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 19:40:09.546777 systemd[1]: Finished modprobe@fuse.service. Apr 12 19:40:09.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.550566 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 19:40:09.550683 systemd[1]: Finished modprobe@loop.service. Apr 12 19:40:09.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.554182 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:40:09.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.557661 systemd[1]: Finished systemd-network-generator.service. Apr 12 19:40:09.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.561222 systemd[1]: Finished systemd-remount-fs.service. Apr 12 19:40:09.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.564756 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:40:09.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.568227 systemd[1]: Reached target network-pre.target. Apr 12 19:40:09.572455 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 19:40:09.576721 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 19:40:09.579954 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 19:40:09.581462 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 19:40:09.585453 systemd[1]: Starting systemd-journal-flush.service... Apr 12 19:40:09.588476 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 19:40:09.589541 systemd[1]: Starting systemd-random-seed.service... Apr 12 19:40:09.591735 systemd-journald[1912]: Time spent on flushing to /var/log/journal/0066cfb674c34f13831c3bec93fdbf0a is 24.940ms for 2585 entries. Apr 12 19:40:09.591735 systemd-journald[1912]: System Journal (/var/log/journal/0066cfb674c34f13831c3bec93fdbf0a) is 8.0M, max 195.6M, 187.6M free. Apr 12 19:40:09.625447 systemd-journald[1912]: Received client request to flush runtime journal. Apr 12 19:40:09.603561 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 19:40:09.604740 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:40:09.608868 systemd[1]: Starting systemd-sysusers.service... Apr 12 19:40:09.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.613009 systemd[1]: Starting systemd-udev-settle.service... Apr 12 19:40:09.617530 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 19:40:09.620533 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 19:40:09.623596 systemd[1]: Finished systemd-random-seed.service. Apr 12 19:40:09.626570 systemd[1]: Finished systemd-journal-flush.service. Apr 12 19:40:09.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.629352 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:40:09.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.631906 systemd[1]: Finished systemd-sysusers.service. Apr 12 19:40:09.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.636002 systemd[1]: Reached target first-boot-complete.target. Apr 12 19:40:09.639542 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:40:09.643497 udevadm[1926]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 19:40:09.656006 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:40:09.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.904035 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 19:40:09.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.906000 audit: BPF prog-id=21 op=LOAD Apr 12 19:40:09.907000 audit: BPF prog-id=22 op=LOAD Apr 12 19:40:09.907000 audit: BPF prog-id=7 op=UNLOAD Apr 12 19:40:09.907000 audit: BPF prog-id=8 op=UNLOAD Apr 12 19:40:09.908065 systemd[1]: Starting systemd-udevd.service... Apr 12 19:40:09.925874 systemd-udevd[1931]: Using default interface naming scheme 'v252'. Apr 12 19:40:09.938973 systemd[1]: Started systemd-udevd.service. Apr 12 19:40:09.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.942000 audit: BPF prog-id=23 op=LOAD Apr 12 19:40:09.943397 systemd[1]: Starting systemd-networkd.service... Apr 12 19:40:09.948000 audit: BPF prog-id=24 op=LOAD Apr 12 19:40:09.949000 audit: BPF prog-id=25 op=LOAD Apr 12 19:40:09.949000 audit: BPF prog-id=26 op=LOAD Apr 12 19:40:09.950207 systemd[1]: Starting systemd-userdbd.service... Apr 12 19:40:09.954670 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 19:40:09.977341 systemd[1]: Started systemd-userdbd.service. Apr 12 19:40:09.987301 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1944) Apr 12 19:40:09.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:09.985000 audit[1952]: AVC avc: denied { confidentiality } for pid=1952 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:40:09.985000 audit[1952]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff82156010 a1=e46d4 a2=ffff841024b0 a3=aaaafd82b010 items=312 ppid=1931 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:09.985000 audit: CWD cwd="/" Apr 12 19:40:09.985000 audit: PATH item=0 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=1 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=2 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=3 name=(null) inode=25632 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=4 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=5 name=(null) inode=25633 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=6 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=7 name=(null) inode=25634 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=8 name=(null) inode=25634 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=9 name=(null) inode=25635 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=10 name=(null) inode=25634 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=11 name=(null) inode=25636 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=12 name=(null) inode=25634 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=13 name=(null) inode=25637 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=14 name=(null) inode=25634 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=15 name=(null) inode=25638 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=16 name=(null) inode=25634 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=17 name=(null) inode=25639 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=18 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=19 name=(null) inode=25640 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=20 name=(null) inode=25640 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=21 name=(null) inode=25641 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=22 name=(null) inode=25640 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=23 name=(null) inode=25642 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=24 name=(null) inode=25640 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=25 name=(null) inode=25643 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=26 name=(null) inode=25640 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=27 name=(null) inode=25644 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=28 name=(null) inode=25640 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=29 name=(null) inode=25645 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=30 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=31 name=(null) inode=25646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=32 name=(null) inode=25646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=33 name=(null) inode=25647 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=34 name=(null) inode=25646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=35 name=(null) inode=25648 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=36 name=(null) inode=25646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=37 name=(null) inode=25649 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=38 name=(null) inode=25646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=39 name=(null) inode=25650 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=40 name=(null) inode=25646 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=41 name=(null) inode=25651 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=42 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=43 name=(null) inode=25652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=44 name=(null) inode=25652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=45 name=(null) inode=25653 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=46 name=(null) inode=25652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=47 name=(null) inode=25654 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=48 name=(null) inode=25652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=49 name=(null) inode=25655 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=50 name=(null) inode=25652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=51 name=(null) inode=25656 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=52 name=(null) inode=25652 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=53 name=(null) inode=25657 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=54 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=55 name=(null) inode=25658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=56 name=(null) inode=25658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=57 name=(null) inode=25659 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=58 name=(null) inode=25658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=59 name=(null) inode=25660 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=60 name=(null) inode=25658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=61 name=(null) inode=25661 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=62 name=(null) inode=25658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=63 name=(null) inode=25662 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=64 name=(null) inode=25658 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=65 name=(null) inode=25663 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=66 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=67 name=(null) inode=25664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=68 name=(null) inode=25664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=69 name=(null) inode=25665 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=70 name=(null) inode=25664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=71 name=(null) inode=25666 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=72 name=(null) inode=25664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=73 name=(null) inode=25667 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=74 name=(null) inode=25664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=75 name=(null) inode=25668 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=76 name=(null) inode=25664 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=77 name=(null) inode=25669 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=78 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=79 name=(null) inode=25670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=80 name=(null) inode=25670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=81 name=(null) inode=25671 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=82 name=(null) inode=25670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=83 name=(null) inode=25672 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=84 name=(null) inode=25670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=85 name=(null) inode=25673 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=86 name=(null) inode=25670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=87 name=(null) inode=25674 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=88 name=(null) inode=25670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=89 name=(null) inode=25675 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=90 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=91 name=(null) inode=25676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=92 name=(null) inode=25676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=93 name=(null) inode=25677 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=94 name=(null) inode=25676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=95 name=(null) inode=25678 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=96 name=(null) inode=25676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=97 name=(null) inode=25679 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=98 name=(null) inode=25676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=99 name=(null) inode=25680 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.998312 kernel: IPMI message handler: version 39.2 Apr 12 19:40:09.985000 audit: PATH item=100 name=(null) inode=25676 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=101 name=(null) inode=25681 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=102 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=103 name=(null) inode=25682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=104 name=(null) inode=25682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=105 name=(null) inode=25683 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=106 name=(null) inode=25682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=107 name=(null) inode=25684 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=108 name=(null) inode=25682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=109 name=(null) inode=25685 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=110 name=(null) inode=25682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=111 name=(null) inode=25686 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=112 name=(null) inode=25682 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=113 name=(null) inode=25687 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=114 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=115 name=(null) inode=25688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=116 name=(null) inode=25688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=117 name=(null) inode=25689 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=118 name=(null) inode=25688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=119 name=(null) inode=25690 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=120 name=(null) inode=25688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=121 name=(null) inode=25691 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=122 name=(null) inode=25688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=123 name=(null) inode=25692 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=124 name=(null) inode=25688 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=125 name=(null) inode=25693 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=126 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=127 name=(null) inode=25694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=128 name=(null) inode=25694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=129 name=(null) inode=25695 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=130 name=(null) inode=25694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=131 name=(null) inode=25696 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=132 name=(null) inode=25694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=133 name=(null) inode=25697 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=134 name=(null) inode=25694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=135 name=(null) inode=25698 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=136 name=(null) inode=25694 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=137 name=(null) inode=25699 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=138 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=139 name=(null) inode=25700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=140 name=(null) inode=25700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=141 name=(null) inode=25701 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=142 name=(null) inode=25700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=143 name=(null) inode=25702 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=144 name=(null) inode=25700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=145 name=(null) inode=25703 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=146 name=(null) inode=25700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=147 name=(null) inode=25704 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=148 name=(null) inode=25700 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=149 name=(null) inode=25705 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=150 name=(null) inode=25631 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=151 name=(null) inode=25706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=152 name=(null) inode=25706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=153 name=(null) inode=25707 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=154 name=(null) inode=25706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=155 name=(null) inode=25708 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=156 name=(null) inode=25706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=157 name=(null) inode=25709 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:10.000358 kernel: ipmi device interface Apr 12 19:40:09.985000 audit: PATH item=158 name=(null) inode=25706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=159 name=(null) inode=25710 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=160 name=(null) inode=25706 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=161 name=(null) inode=25711 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=162 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=163 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=164 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=165 name=(null) inode=25713 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=166 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=167 name=(null) inode=25714 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=168 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=169 name=(null) inode=25715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=170 name=(null) inode=25715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=171 name=(null) inode=25716 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=172 name=(null) inode=25715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=173 name=(null) inode=25717 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=174 name=(null) inode=25715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=175 name=(null) inode=25718 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=176 name=(null) inode=25715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=177 name=(null) inode=25719 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=178 name=(null) inode=25715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=179 name=(null) inode=25720 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=180 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=181 name=(null) inode=25721 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=182 name=(null) inode=25721 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=183 name=(null) inode=25722 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=184 name=(null) inode=25721 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=185 name=(null) inode=25723 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=186 name=(null) inode=25721 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=187 name=(null) inode=25724 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=188 name=(null) inode=25721 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=189 name=(null) inode=25725 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=190 name=(null) inode=25721 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=191 name=(null) inode=25726 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=192 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=193 name=(null) inode=25727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=194 name=(null) inode=25727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=195 name=(null) inode=25728 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=196 name=(null) inode=25727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=197 name=(null) inode=25729 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=198 name=(null) inode=25727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=199 name=(null) inode=25730 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=200 name=(null) inode=25727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=201 name=(null) inode=25731 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=202 name=(null) inode=25727 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=203 name=(null) inode=25732 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=204 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=205 name=(null) inode=25733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=206 name=(null) inode=25733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=207 name=(null) inode=25734 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=208 name=(null) inode=25733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=209 name=(null) inode=25735 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=210 name=(null) inode=25733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=211 name=(null) inode=25736 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=212 name=(null) inode=25733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=213 name=(null) inode=25737 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=214 name=(null) inode=25733 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=215 name=(null) inode=25738 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=216 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=217 name=(null) inode=25739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=218 name=(null) inode=25739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=219 name=(null) inode=25740 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=220 name=(null) inode=25739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=221 name=(null) inode=25741 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=222 name=(null) inode=25739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=223 name=(null) inode=25742 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=224 name=(null) inode=25739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=225 name=(null) inode=25743 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=226 name=(null) inode=25739 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=227 name=(null) inode=25744 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=228 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=229 name=(null) inode=25745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=230 name=(null) inode=25745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=231 name=(null) inode=25746 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=232 name=(null) inode=25745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=233 name=(null) inode=25747 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=234 name=(null) inode=25745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=235 name=(null) inode=25748 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=236 name=(null) inode=25745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=237 name=(null) inode=25749 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=238 name=(null) inode=25745 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=239 name=(null) inode=25750 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=240 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=241 name=(null) inode=25751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=242 name=(null) inode=25751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=243 name=(null) inode=25752 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=244 name=(null) inode=25751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=245 name=(null) inode=25753 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=246 name=(null) inode=25751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=247 name=(null) inode=25754 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=248 name=(null) inode=25751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=249 name=(null) inode=25755 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=250 name=(null) inode=25751 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=251 name=(null) inode=25756 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=252 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=253 name=(null) inode=25757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=254 name=(null) inode=25757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=255 name=(null) inode=25758 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=256 name=(null) inode=25757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=257 name=(null) inode=25759 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=258 name=(null) inode=25757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=259 name=(null) inode=25760 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=260 name=(null) inode=25757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=261 name=(null) inode=25761 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=262 name=(null) inode=25757 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=263 name=(null) inode=25762 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=264 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=265 name=(null) inode=25763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=266 name=(null) inode=25763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=267 name=(null) inode=25764 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=268 name=(null) inode=25763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=269 name=(null) inode=25765 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=270 name=(null) inode=25763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=271 name=(null) inode=25766 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=272 name=(null) inode=25763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=273 name=(null) inode=25767 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=274 name=(null) inode=25763 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=275 name=(null) inode=25768 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=276 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=277 name=(null) inode=25769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=278 name=(null) inode=25769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=279 name=(null) inode=25770 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=280 name=(null) inode=25769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=281 name=(null) inode=25771 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=282 name=(null) inode=25769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=283 name=(null) inode=25772 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=284 name=(null) inode=25769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=285 name=(null) inode=25773 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=286 name=(null) inode=25769 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=287 name=(null) inode=25774 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=288 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=289 name=(null) inode=25775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=290 name=(null) inode=25775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=291 name=(null) inode=25776 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=292 name=(null) inode=25775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=293 name=(null) inode=25777 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=294 name=(null) inode=25775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=295 name=(null) inode=25778 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=296 name=(null) inode=25775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=297 name=(null) inode=25779 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=298 name=(null) inode=25775 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=299 name=(null) inode=25780 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=300 name=(null) inode=25712 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=301 name=(null) inode=25781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=302 name=(null) inode=25781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=303 name=(null) inode=25782 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=304 name=(null) inode=25781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=305 name=(null) inode=25783 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=306 name=(null) inode=25781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=307 name=(null) inode=25784 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=308 name=(null) inode=25781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=309 name=(null) inode=25785 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=310 name=(null) inode=25781 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PATH item=311 name=(null) inode=25786 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:40:09.985000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 19:40:09.998799 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:40:10.009303 kernel: ipmi_si: IPMI System Interface driver Apr 12 19:40:10.009345 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 19:40:10.032223 kernel: ipmi_si: Unable to find any System Interface(s) Apr 12 19:40:10.044181 systemd-networkd[1940]: bond0: netdev ready Apr 12 19:40:10.047391 systemd-networkd[1940]: lo: Link UP Apr 12 19:40:10.047397 systemd-networkd[1940]: lo: Gained carrier Apr 12 19:40:10.052392 systemd-networkd[1940]: Enumeration completed Apr 12 19:40:10.052477 systemd[1]: Started systemd-networkd.service. Apr 12 19:40:10.052827 systemd-networkd[1940]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 19:40:10.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.055746 systemd-networkd[1940]: enP1p1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:52:20:01.network. Apr 12 19:40:10.143746 systemd[1]: Finished systemd-udev-settle.service. Apr 12 19:40:10.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.148273 systemd[1]: Starting lvm2-activation-early.service... Apr 12 19:40:10.159422 lvm[2025]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:40:10.190060 systemd[1]: Finished lvm2-activation-early.service. Apr 12 19:40:10.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.193233 systemd[1]: Reached target cryptsetup.target. Apr 12 19:40:10.197419 systemd[1]: Starting lvm2-activation.service... Apr 12 19:40:10.202332 lvm[2026]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:40:10.237246 systemd[1]: Finished lvm2-activation.service. Apr 12 19:40:10.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.240383 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:40:10.243438 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 19:40:10.243460 systemd[1]: Reached target local-fs.target. Apr 12 19:40:10.246543 systemd[1]: Reached target machines.target. Apr 12 19:40:10.250657 systemd[1]: Starting ldconfig.service... Apr 12 19:40:10.253978 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 19:40:10.254033 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:40:10.255315 systemd[1]: Starting systemd-boot-update.service... Apr 12 19:40:10.259330 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 19:40:10.263645 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 19:40:10.266850 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:40:10.266885 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:40:10.268001 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 19:40:10.273147 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 19:40:10.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.276372 systemd[1]: boot.automount: Got automount request for /boot, triggered by 2029 (bootctl) Apr 12 19:40:10.277520 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 19:40:10.279433 systemd-tmpfiles[2037]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 19:40:10.280589 systemd-tmpfiles[2037]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 19:40:10.281636 systemd-tmpfiles[2037]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 19:40:10.326505 systemd-fsck[2043]: fsck.fat 4.2 (2021-01-31) Apr 12 19:40:10.326505 systemd-fsck[2043]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 19:40:10.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.327752 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 19:40:10.332162 systemd[1]: Mounting boot.mount... Apr 12 19:40:10.355759 systemd[1]: Mounted boot.mount. Apr 12 19:40:10.359319 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 19:40:10.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.368102 systemd[1]: Finished systemd-boot-update.service. Apr 12 19:40:10.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.420923 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 19:40:10.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.425349 systemd[1]: Starting audit-rules.service... Apr 12 19:40:10.429623 systemd[1]: Starting clean-ca-certificates.service... Apr 12 19:40:10.434327 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 19:40:10.438000 audit: BPF prog-id=27 op=LOAD Apr 12 19:40:10.439467 systemd[1]: Starting systemd-resolved.service... Apr 12 19:40:10.443000 audit: BPF prog-id=28 op=LOAD Apr 12 19:40:10.444560 systemd[1]: Starting systemd-timesyncd.service... Apr 12 19:40:10.448961 systemd[1]: Starting systemd-update-utmp.service... Apr 12 19:40:10.452516 systemd[1]: Finished clean-ca-certificates.service. Apr 12 19:40:10.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.455804 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 19:40:10.455000 audit[2064]: SYSTEM_BOOT pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 19:40:10.457000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 19:40:10.457000 audit[2066]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd989b760 a2=420 a3=0 items=0 ppid=2046 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:10.457000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 19:40:10.458117 augenrules[2066]: No rules Apr 12 19:40:10.458949 systemd[1]: Finished audit-rules.service. Apr 12 19:40:10.463827 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 19:40:10.464738 systemd[1]: Finished systemd-update-utmp.service. Apr 12 19:40:10.476037 ldconfig[2027]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 19:40:10.478047 systemd[1]: Finished ldconfig.service. Apr 12 19:40:10.482231 systemd[1]: Starting systemd-update-done.service... Apr 12 19:40:10.486163 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 19:40:10.488761 systemd[1]: Finished systemd-update-done.service. Apr 12 19:40:10.500810 systemd[1]: Started systemd-timesyncd.service. Apr 12 19:40:10.503598 systemd[1]: Reached target time-set.target. Apr 12 19:40:10.503885 systemd-resolved[2058]: Positive Trust Anchors: Apr 12 19:40:10.503893 systemd-resolved[2058]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:40:10.503919 systemd-resolved[2058]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:40:10.507222 systemd-resolved[2058]: Using system hostname 'ci-3510.3.3-a-f02954802e'. Apr 12 19:40:12.118306 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 19:40:12.133080 systemd-networkd[1940]: enP1p1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:52:20:00.network. Apr 12 19:40:12.133382 kernel: bond0: (slave enP1p1s0f1np1): Enslaving as a backup interface with an up link Apr 12 19:40:12.133479 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:40:12.266306 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:40:12.595304 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:40:12.943302 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 19:40:12.959304 kernel: bond0: (slave enP1p1s0f0np0): Enslaving as a backup interface with an up link Apr 12 19:40:12.970303 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 19:40:12.971462 systemd-networkd[1940]: bond0: Link UP Apr 12 19:40:12.971890 systemd-networkd[1940]: enP1p1s0f1np1: Link UP Apr 12 19:40:12.972248 systemd-networkd[1940]: enP1p1s0f0np0: Link UP Apr 12 19:40:12.972558 systemd-networkd[1940]: enP1p1s0f1np1: Gained carrier Apr 12 19:40:12.972606 systemd[1]: Started systemd-resolved.service. Apr 12 19:40:12.973157 systemd[1]: Reached target network.target. Apr 12 19:40:12.973977 systemd-networkd[1940]: enP1p1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:52:20:00.network. Apr 12 19:40:12.975301 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 19:40:12.975369 kernel: bond0: active interface up! Apr 12 19:40:12.975404 kernel: bond0: (slave enP1p1s0f0np0): link status definitely up, 25000 Mbps full duplex Apr 12 19:40:13.008692 systemd[1]: Reached target nss-lookup.target. Apr 12 19:40:13.012655 systemd[1]: Reached target sysinit.target. Apr 12 19:40:13.016661 systemd[1]: Started motdgen.path. Apr 12 19:40:13.020641 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 19:40:13.024842 systemd[1]: Started logrotate.timer. Apr 12 19:40:13.028950 systemd[1]: Started mdadm.timer. Apr 12 19:40:13.032911 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 19:40:13.036862 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 19:40:13.036882 systemd[1]: Reached target paths.target. Apr 12 19:40:13.040802 systemd[1]: Reached target timers.target. Apr 12 19:40:13.044982 systemd[1]: Listening on dbus.socket. Apr 12 19:40:13.050081 systemd[1]: Starting docker.socket... Apr 12 19:40:13.056656 systemd[1]: Listening on sshd.socket. Apr 12 19:40:13.060776 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:40:13.061212 systemd[1]: Listening on docker.socket. Apr 12 19:40:13.065224 systemd[1]: Reached target sockets.target. Apr 12 19:40:13.069153 systemd[1]: Reached target basic.target. Apr 12 19:40:13.073034 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:40:13.073053 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:40:13.074234 systemd[1]: Starting containerd.service... Apr 12 19:40:13.076299 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.104301 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.104742 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 19:40:13.107298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.135300 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.136003 systemd[1]: Starting coreos-metadata.service... Apr 12 19:40:13.138299 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.153082 coreos-metadata[2076]: Apr 12 19:40:13.143 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:40:13.153082 coreos-metadata[2076]: Apr 12 19:40:13.146 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:40:13.166298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.167071 systemd[1]: Starting dbus.service... Apr 12 19:40:13.169298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.177034 coreos-metadata[2079]: Apr 12 19:40:13.176 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:40:13.177875 coreos-metadata[2079]: Apr 12 19:40:13.177 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:40:13.183730 dbus-daemon[2083]: [system] SELinux support is enabled Apr 12 19:40:13.197298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.197476 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 19:40:13.200298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.203415 jq[2085]: false Apr 12 19:40:13.226298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.227475 systemd[1]: Starting extend-filesystems.service... Apr 12 19:40:13.229298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.239630 extend-filesystems[2086]: Found nvme0n1 Apr 12 19:40:13.309277 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.309304 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 233815889 blocks Apr 12 19:40:13.309352 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.309367 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.309380 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.280489 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p1 Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p2 Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p3 Apr 12 19:40:13.309487 extend-filesystems[2086]: Found usr Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p4 Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p6 Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p7 Apr 12 19:40:13.309487 extend-filesystems[2086]: Found nvme0n1p9 Apr 12 19:40:13.309487 extend-filesystems[2086]: Checking size of /dev/nvme0n1p9 Apr 12 19:40:13.309487 extend-filesystems[2086]: Resized partition /dev/nvme0n1p9 Apr 12 19:40:13.983159 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983204 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983230 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983255 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983280 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983311 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983337 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983360 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983372 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983390 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983403 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983427 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983475 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983487 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983500 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983512 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983525 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983537 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983559 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983572 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983585 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983600 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983613 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983654 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983667 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983680 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983693 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983705 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983734 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983747 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983760 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983775 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983788 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983800 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983812 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983825 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983856 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983869 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983881 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983894 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983906 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983919 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983931 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983944 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.983958 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.282698 systemd[1]: Starting motdgen.service... Apr 12 19:40:13.984240 extend-filesystems[2095]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 19:40:14.057588 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.057622 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.057682 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.057739 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.057798 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:13.339955 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 19:40:13.399493 systemd[1]: Starting prepare-critools.service... Apr 12 19:40:13.473513 systemd[1]: Starting prepare-helm.service... Apr 12 19:40:13.560301 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 19:40:13.645643 systemd[1]: Starting sshd-keygen.service... Apr 12 19:40:13.706298 systemd[1]: Starting systemd-logind.service... Apr 12 19:40:13.760805 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:40:14.058523 update_engine[2115]: I0412 19:40:13.797906 2115 main.cc:92] Flatcar Update Engine starting Apr 12 19:40:14.058523 update_engine[2115]: I0412 19:40:13.800336 2115 update_check_scheduler.cc:74] Next update check in 4m9s Apr 12 19:40:13.760975 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 19:40:14.058816 jq[2116]: true Apr 12 19:40:13.761841 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 19:40:13.763310 systemd[1]: Starting update-engine.service... Apr 12 19:40:14.059135 tar[2118]: ./ Apr 12 19:40:14.059135 tar[2118]: ./loopback Apr 12 19:40:13.821838 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 19:40:13.850403 systemd-logind[2114]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 19:40:13.878992 systemd-logind[2114]: New seat seat0. Apr 12 19:40:13.880556 systemd[1]: Started dbus.service. Apr 12 19:40:13.944448 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 19:40:13.944715 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 19:40:13.945201 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 19:40:13.945401 systemd[1]: Finished motdgen.service. Apr 12 19:40:14.032570 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 19:40:14.032841 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 19:40:14.060380 tar[2118]: ./bandwidth Apr 12 19:40:14.061297 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.087491 tar[2118]: ./ptp Apr 12 19:40:14.088298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.093417 dbus-daemon[2083]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 19:40:14.093508 jq[2124]: true Apr 12 19:40:14.093646 tar[2119]: crictl Apr 12 19:40:14.095725 tar[2120]: linux-arm64/helm Apr 12 19:40:14.098795 systemd[1]: Started update-engine.service. Apr 12 19:40:14.104298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.107301 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.118775 tar[2118]: ./vlan Apr 12 19:40:14.133045 bash[2145]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:40:14.133323 env[2125]: time="2024-04-12T19:40:14.133269080Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 19:40:14.134055 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 19:40:14.134306 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.137300 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.146328 coreos-metadata[2076]: Apr 12 19:40:14.146 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 19:40:14.146706 coreos-metadata[2076]: Apr 12 19:40:14.146 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:40:14.149854 env[2125]: time="2024-04-12T19:40:14.149825800Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 19:40:14.149982 env[2125]: time="2024-04-12T19:40:14.149967880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151014 env[2125]: time="2024-04-12T19:40:14.150990720Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151037 env[2125]: time="2024-04-12T19:40:14.151015640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151216 env[2125]: time="2024-04-12T19:40:14.151201080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151268 env[2125]: time="2024-04-12T19:40:14.151219080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151268 env[2125]: time="2024-04-12T19:40:14.151231120Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 19:40:14.151268 env[2125]: time="2024-04-12T19:40:14.151240520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151326 env[2125]: time="2024-04-12T19:40:14.151317120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151736 env[2125]: time="2024-04-12T19:40:14.151722080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151863 env[2125]: time="2024-04-12T19:40:14.151847920Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:40:14.151888 env[2125]: time="2024-04-12T19:40:14.151863880Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 19:40:14.151931 env[2125]: time="2024-04-12T19:40:14.151919920Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 19:40:14.151953 env[2125]: time="2024-04-12T19:40:14.151941240Z" level=info msg="metadata content store policy set" policy=shared Apr 12 19:40:14.162161 env[2125]: time="2024-04-12T19:40:14.162135280Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 19:40:14.162203 env[2125]: time="2024-04-12T19:40:14.162167040Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 19:40:14.162203 env[2125]: time="2024-04-12T19:40:14.162178720Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 19:40:14.162273 env[2125]: time="2024-04-12T19:40:14.162205400Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162273 env[2125]: time="2024-04-12T19:40:14.162218760Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162273 env[2125]: time="2024-04-12T19:40:14.162232240Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162273 env[2125]: time="2024-04-12T19:40:14.162244000Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162539 env[2125]: time="2024-04-12T19:40:14.162528040Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162565 env[2125]: time="2024-04-12T19:40:14.162545040Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162565 env[2125]: time="2024-04-12T19:40:14.162559120Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162604 env[2125]: time="2024-04-12T19:40:14.162570680Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162604 env[2125]: time="2024-04-12T19:40:14.162583400Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 19:40:14.162707 env[2125]: time="2024-04-12T19:40:14.162695000Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 19:40:14.162780 env[2125]: time="2024-04-12T19:40:14.162770040Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 19:40:14.162868 tar[2118]: ./host-device Apr 12 19:40:14.162977 env[2125]: time="2024-04-12T19:40:14.162966280Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 19:40:14.162999 env[2125]: time="2024-04-12T19:40:14.162989440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163022 env[2125]: time="2024-04-12T19:40:14.163001960Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 19:40:14.163112 env[2125]: time="2024-04-12T19:40:14.163102800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163138 env[2125]: time="2024-04-12T19:40:14.163122240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163138 env[2125]: time="2024-04-12T19:40:14.163133440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163174 env[2125]: time="2024-04-12T19:40:14.163144120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163174 env[2125]: time="2024-04-12T19:40:14.163157040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163174 env[2125]: time="2024-04-12T19:40:14.163168600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163227 env[2125]: time="2024-04-12T19:40:14.163178840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163227 env[2125]: time="2024-04-12T19:40:14.163190600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163227 env[2125]: time="2024-04-12T19:40:14.163202560Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 19:40:14.163334 env[2125]: time="2024-04-12T19:40:14.163321280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163355 env[2125]: time="2024-04-12T19:40:14.163342800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163421 env[2125]: time="2024-04-12T19:40:14.163354440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163421 env[2125]: time="2024-04-12T19:40:14.163365280Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 19:40:14.163421 env[2125]: time="2024-04-12T19:40:14.163377280Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 19:40:14.163421 env[2125]: time="2024-04-12T19:40:14.163387040Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 19:40:14.163421 env[2125]: time="2024-04-12T19:40:14.163402960Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 19:40:14.163512 env[2125]: time="2024-04-12T19:40:14.163433400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 19:40:14.163649 env[2125]: time="2024-04-12T19:40:14.163610320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 19:40:14.164429 env[2125]: time="2024-04-12T19:40:14.163659600Z" level=info msg="Connect containerd service" Apr 12 19:40:14.164429 env[2125]: time="2024-04-12T19:40:14.163692720Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 19:40:14.164429 env[2125]: time="2024-04-12T19:40:14.164248920Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:40:14.164429 env[2125]: time="2024-04-12T19:40:14.164316120Z" level=info msg="Start subscribing containerd event" Apr 12 19:40:14.165016 env[2125]: time="2024-04-12T19:40:14.164960680Z" level=info msg="Start recovering state" Apr 12 19:40:14.165242 env[2125]: time="2024-04-12T19:40:14.165221880Z" level=info msg="Start event monitor" Apr 12 19:40:14.165268 env[2125]: time="2024-04-12T19:40:14.165258840Z" level=info msg="Start snapshots syncer" Apr 12 19:40:14.165289 env[2125]: time="2024-04-12T19:40:14.165272320Z" level=info msg="Start cni network conf syncer for default" Apr 12 19:40:14.165289 env[2125]: time="2024-04-12T19:40:14.165280640Z" level=info msg="Start streaming server" Apr 12 19:40:14.165334 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.165366 env[2125]: time="2024-04-12T19:40:14.165345720Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 19:40:14.165411 env[2125]: time="2024-04-12T19:40:14.165402480Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 19:40:14.165453 env[2125]: time="2024-04-12T19:40:14.165444440Z" level=info msg="containerd successfully booted in 0.032793s" Apr 12 19:40:14.165500 systemd[1]: Started containerd.service. Apr 12 19:40:14.167300 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.169323 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.183005 coreos-metadata[2079]: Apr 12 19:40:14.182 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 19:40:14.183350 coreos-metadata[2079]: Apr 12 19:40:14.183 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:40:14.190422 tar[2118]: ./tuning Apr 12 19:40:14.209299 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.215166 tar[2118]: ./vrf Apr 12 19:40:14.224300 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.225853 systemd[1]: Started systemd-logind.service. Apr 12 19:40:14.227299 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.229298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.240694 tar[2118]: ./sbr Apr 12 19:40:14.265735 tar[2118]: ./tap Apr 12 19:40:14.268297 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.271961 systemd[1]: Started locksmithd.service. Apr 12 19:40:14.283298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.286297 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.294654 tar[2118]: ./dhcp Apr 12 19:40:14.312298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.312333 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 19:40:14.312470 systemd[1]: Reached target system-config.target. Apr 12 19:40:14.314300 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.320071 locksmithd[2157]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 19:40:14.341502 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 19:40:14.341609 systemd[1]: Reached target user-config.target. Apr 12 19:40:14.342298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.345298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.365340 tar[2118]: ./static Apr 12 19:40:14.371298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.386147 tar[2118]: ./firewall Apr 12 19:40:14.386315 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.401298 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.412885 tar[2120]: linux-arm64/LICENSE Apr 12 19:40:14.412963 tar[2120]: linux-arm64/README.md Apr 12 19:40:14.416299 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.417053 systemd[1]: Finished prepare-helm.service. Apr 12 19:40:14.417589 tar[2118]: ./macvlan Apr 12 19:40:14.419300 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.421302 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.446180 tar[2118]: ./dummy Apr 12 19:40:14.458299 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.472313 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.474298 tar[2118]: ./bridge Apr 12 19:40:14.486519 systemd-networkd[1940]: bond0: Gained carrier Apr 12 19:40:14.486725 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:14.486768 systemd-networkd[1940]: enP1p1s0f0np0: Gained carrier Apr 12 19:40:14.496071 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:40:14.496115 kernel: bond0: (slave enP1p1s0f1np1): invalid new link 1 on slave Apr 12 19:40:14.504982 tar[2118]: ./ipvlan Apr 12 19:40:14.507556 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:14.507632 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:14.507983 systemd-networkd[1940]: enP1p1s0f1np1: Link DOWN Apr 12 19:40:14.507988 systemd-networkd[1940]: enP1p1s0f1np1: Lost carrier Apr 12 19:40:14.521465 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:14.521503 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:14.521726 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:14.531761 systemd[1]: Finished prepare-critools.service. Apr 12 19:40:14.533163 tar[2118]: ./portmap Apr 12 19:40:14.550299 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 233815889 Apr 12 19:40:14.563577 extend-filesystems[2095]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 19:40:14.563577 extend-filesystems[2095]: old_desc_blocks = 1, new_desc_blocks = 112 Apr 12 19:40:14.563577 extend-filesystems[2095]: The filesystem on /dev/nvme0n1p9 is now 233815889 (4k) blocks long. Apr 12 19:40:14.584645 extend-filesystems[2086]: Resized filesystem in /dev/nvme0n1p9 Apr 12 19:40:14.584645 extend-filesystems[2086]: Found nvme1n1 Apr 12 19:40:14.591841 tar[2118]: ./host-local Apr 12 19:40:14.564875 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 19:40:14.565050 systemd[1]: Finished extend-filesystems.service. Apr 12 19:40:14.606408 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 19:40:14.796152 sshd_keygen[2113]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 19:40:14.813095 systemd[1]: Finished sshd-keygen.service. Apr 12 19:40:14.818479 systemd[1]: Starting issuegen.service... Apr 12 19:40:14.825762 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 19:40:14.825911 systemd[1]: Finished issuegen.service. Apr 12 19:40:14.831185 systemd[1]: Starting systemd-user-sessions.service... Apr 12 19:40:14.837962 systemd[1]: Finished systemd-user-sessions.service. Apr 12 19:40:14.843006 systemd[1]: Started getty@tty1.service. Apr 12 19:40:14.848174 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 19:40:14.851970 systemd[1]: Reached target getty.target. Apr 12 19:40:15.367300 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 19:40:15.379299 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 19:40:15.379372 kernel: bond0: (slave enP1p1s0f1np1): speed changed to 0 on port 1 Apr 12 19:40:15.399293 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 19:40:15.390401 systemd-networkd[1940]: enP1p1s0f1np1: Link UP Apr 12 19:40:15.390573 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:15.390685 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:15.390705 systemd-networkd[1940]: enP1p1s0f1np1: Gained carrier Apr 12 19:40:15.413299 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 19:40:15.416553 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:15.416622 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:15.416763 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:15.515352 systemd-networkd[1940]: bond0: Gained IPv6LL Apr 12 19:40:15.515608 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:16.146846 coreos-metadata[2076]: Apr 12 19:40:16.146 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 19:40:16.183487 coreos-metadata[2079]: Apr 12 19:40:16.183 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 19:40:16.411591 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:16.411689 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:17.169306 kernel: mlx5_core 0001:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 19:40:19.864998 login[2183]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 19:40:19.865341 login[2182]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 19:40:19.878817 systemd[1]: Created slice user-500.slice. Apr 12 19:40:19.880105 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 19:40:19.881568 systemd-logind[2114]: New session 1 of user core. Apr 12 19:40:19.887614 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 19:40:19.889091 systemd[1]: Starting user@500.service... Apr 12 19:40:19.891812 (systemd)[2189]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:19.971159 systemd[2189]: Queued start job for default target default.target. Apr 12 19:40:19.971752 systemd[2189]: Reached target paths.target. Apr 12 19:40:19.971769 systemd[2189]: Reached target sockets.target. Apr 12 19:40:19.971781 systemd[2189]: Reached target timers.target. Apr 12 19:40:19.971790 systemd[2189]: Reached target basic.target. Apr 12 19:40:19.971826 systemd[2189]: Reached target default.target. Apr 12 19:40:19.971851 systemd[2189]: Startup finished in 75ms. Apr 12 19:40:19.971904 systemd[1]: Started user@500.service. Apr 12 19:40:19.972995 systemd[1]: Started session-1.scope. Apr 12 19:40:20.867311 login[2183]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 19:40:20.870603 systemd-logind[2114]: New session 2 of user core. Apr 12 19:40:20.871633 systemd[1]: Started session-2.scope. Apr 12 19:40:21.298103 coreos-metadata[2076]: Apr 12 19:40:21.298 INFO Fetch successful Apr 12 19:40:21.298426 coreos-metadata[2079]: Apr 12 19:40:21.298 INFO Fetch successful Apr 12 19:40:21.335139 unknown[2076]: wrote ssh authorized keys file for user: core Apr 12 19:40:21.335719 systemd[1]: Finished coreos-metadata.service. Apr 12 19:40:21.337287 systemd[1]: Started packet-phone-home.service. Apr 12 19:40:21.343580 curl[2211]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 19:40:21.343769 curl[2211]: Dload Upload Total Spent Left Speed Apr 12 19:40:21.351124 update-ssh-keys[2212]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:40:21.351518 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 19:40:21.351795 systemd[1]: Reached target multi-user.target. Apr 12 19:40:21.353146 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 19:40:21.359331 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 19:40:21.359478 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 19:40:21.362400 systemd[1]: Startup finished in 3.232s (kernel) + 16.060s (initrd) + 15.065s (userspace) = 34.358s. Apr 12 19:40:21.462927 curl[2211]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 19:40:21.465242 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 19:40:21.479144 systemd[1]: Created slice system-sshd.slice. Apr 12 19:40:21.480259 systemd[1]: Started sshd@0-147.75.62.230:22-139.178.89.65:41184.service. Apr 12 19:40:21.953007 sshd[2215]: Accepted publickey for core from 139.178.89.65 port 41184 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:21.954025 sshd[2215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:21.956903 systemd-logind[2114]: New session 3 of user core. Apr 12 19:40:21.957537 systemd[1]: Started session-3.scope. Apr 12 19:40:22.360019 systemd[1]: Started sshd@1-147.75.62.230:22-139.178.89.65:46262.service. Apr 12 19:40:22.823582 sshd[2220]: Accepted publickey for core from 139.178.89.65 port 46262 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:22.824556 sshd[2220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:22.826900 systemd-logind[2114]: New session 4 of user core. Apr 12 19:40:22.827947 systemd[1]: Started session-4.scope. Apr 12 19:40:23.158582 sshd[2220]: pam_unix(sshd:session): session closed for user core Apr 12 19:40:23.161241 systemd[1]: sshd@1-147.75.62.230:22-139.178.89.65:46262.service: Deactivated successfully. Apr 12 19:40:23.161927 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 19:40:23.162346 systemd-logind[2114]: Session 4 logged out. Waiting for processes to exit. Apr 12 19:40:23.163030 systemd-logind[2114]: Removed session 4. Apr 12 19:40:23.234637 systemd[1]: Started sshd@2-147.75.62.230:22-139.178.89.65:46272.service. Apr 12 19:40:23.702370 sshd[2226]: Accepted publickey for core from 139.178.89.65 port 46272 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:23.703372 sshd[2226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:23.705638 systemd-logind[2114]: New session 5 of user core. Apr 12 19:40:23.706640 systemd[1]: Started session-5.scope. Apr 12 19:40:24.036407 sshd[2226]: pam_unix(sshd:session): session closed for user core Apr 12 19:40:24.039048 systemd[1]: sshd@2-147.75.62.230:22-139.178.89.65:46272.service: Deactivated successfully. Apr 12 19:40:24.039750 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 19:40:24.040232 systemd-logind[2114]: Session 5 logged out. Waiting for processes to exit. Apr 12 19:40:24.040882 systemd-logind[2114]: Removed session 5. Apr 12 19:40:24.110914 systemd[1]: Started sshd@3-147.75.62.230:22-139.178.89.65:46286.service. Apr 12 19:40:24.569373 sshd[2232]: Accepted publickey for core from 139.178.89.65 port 46286 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:24.570363 sshd[2232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:24.572661 systemd-logind[2114]: New session 6 of user core. Apr 12 19:40:24.573657 systemd[1]: Started session-6.scope. Apr 12 19:40:24.901186 sshd[2232]: pam_unix(sshd:session): session closed for user core Apr 12 19:40:24.903909 systemd[1]: sshd@3-147.75.62.230:22-139.178.89.65:46286.service: Deactivated successfully. Apr 12 19:40:24.904639 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 19:40:24.905090 systemd-logind[2114]: Session 6 logged out. Waiting for processes to exit. Apr 12 19:40:24.905726 systemd-logind[2114]: Removed session 6. Apr 12 19:40:24.974029 systemd[1]: Started sshd@4-147.75.62.230:22-139.178.89.65:46300.service. Apr 12 19:40:25.434811 sshd[2238]: Accepted publickey for core from 139.178.89.65 port 46300 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:25.435813 sshd[2238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:25.438101 systemd-logind[2114]: New session 7 of user core. Apr 12 19:40:25.439081 systemd[1]: Started session-7.scope. Apr 12 19:40:25.706205 sudo[2241]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 19:40:25.706409 sudo[2241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:40:25.716491 dbus-daemon[2083]: avc: received setenforce notice (enforcing=1) Apr 12 19:40:25.718397 sudo[2241]: pam_unix(sudo:session): session closed for user root Apr 12 19:40:25.790817 sshd[2238]: pam_unix(sshd:session): session closed for user core Apr 12 19:40:25.792934 systemd[1]: sshd@4-147.75.62.230:22-139.178.89.65:46300.service: Deactivated successfully. Apr 12 19:40:25.793606 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 19:40:25.794081 systemd-logind[2114]: Session 7 logged out. Waiting for processes to exit. Apr 12 19:40:25.794812 systemd-logind[2114]: Removed session 7. Apr 12 19:40:25.868411 systemd[1]: Started sshd@5-147.75.62.230:22-139.178.89.65:46306.service. Apr 12 19:40:26.335709 sshd[2245]: Accepted publickey for core from 139.178.89.65 port 46306 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:26.336737 sshd[2245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:26.339199 systemd-logind[2114]: New session 8 of user core. Apr 12 19:40:26.340212 systemd[1]: Started session-8.scope. Apr 12 19:40:26.601627 sudo[2249]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 19:40:26.601822 sudo[2249]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:40:26.603877 sudo[2249]: pam_unix(sudo:session): session closed for user root Apr 12 19:40:26.607903 sudo[2248]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 19:40:26.608089 sudo[2248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:40:26.615177 systemd[1]: Stopping audit-rules.service... Apr 12 19:40:26.615000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:40:26.616530 auditctl[2252]: No rules Apr 12 19:40:26.616913 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 19:40:26.617067 systemd[1]: Stopped audit-rules.service. Apr 12 19:40:26.618661 systemd[1]: Starting audit-rules.service... Apr 12 19:40:26.621675 kernel: kauditd_printk_skb: 404 callbacks suppressed Apr 12 19:40:26.621848 kernel: audit: type=1305 audit(1712950826.615:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:40:26.634222 augenrules[2269]: No rules Apr 12 19:40:26.634795 systemd[1]: Finished audit-rules.service. Apr 12 19:40:26.635528 sudo[2248]: pam_unix(sudo:session): session closed for user root Apr 12 19:40:26.615000 audit[2252]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc7882b50 a2=420 a3=0 items=0 ppid=1 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:26.667255 kernel: audit: type=1300 audit(1712950826.615:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc7882b50 a2=420 a3=0 items=0 ppid=1 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:26.667292 kernel: audit: type=1327 audit(1712950826.615:169): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:40:26.615000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:40:26.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.698502 kernel: audit: type=1131 audit(1712950826.616:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.698532 kernel: audit: type=1130 audit(1712950826.634:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.708820 sshd[2245]: pam_unix(sshd:session): session closed for user core Apr 12 19:40:26.710886 systemd[1]: sshd@5-147.75.62.230:22-139.178.89.65:46306.service: Deactivated successfully. Apr 12 19:40:26.711506 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 19:40:26.711992 systemd-logind[2114]: Session 8 logged out. Waiting for processes to exit. Apr 12 19:40:26.712645 systemd-logind[2114]: Removed session 8. Apr 12 19:40:26.635000 audit[2248]: USER_END pid=2248 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.745816 kernel: audit: type=1106 audit(1712950826.635:172): pid=2248 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.745840 kernel: audit: type=1104 audit(1712950826.635:173): pid=2248 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.635000 audit[2248]: CRED_DISP pid=2248 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.709000 audit[2245]: USER_END pid=2245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:26.785795 systemd[1]: Started sshd@6-147.75.62.230:22-139.178.89.65:46312.service. Apr 12 19:40:26.814804 kernel: audit: type=1106 audit(1712950826.709:174): pid=2245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:26.814858 kernel: audit: type=1104 audit(1712950826.709:175): pid=2245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:26.709000 audit[2245]: CRED_DISP pid=2245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:26.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.62.230:22-139.178.89.65:46306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.895771 kernel: audit: type=1131 audit(1712950826.710:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.62.230:22-139.178.89.65:46306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:26.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.62.230:22-139.178.89.65:46312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:27.249000 audit[2275]: USER_ACCT pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:27.249738 sshd[2275]: Accepted publickey for core from 139.178.89.65 port 46312 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:40:27.250000 audit[2275]: CRED_ACQ pid=2275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:27.250000 audit[2275]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff487ee90 a2=3 a3=1 items=0 ppid=1 pid=2275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:27.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:40:27.250676 sshd[2275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:40:27.253115 systemd-logind[2114]: New session 9 of user core. Apr 12 19:40:27.254084 systemd[1]: Started session-9.scope. Apr 12 19:40:27.256000 audit[2275]: USER_START pid=2275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:27.257000 audit[2277]: CRED_ACQ pid=2277 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:27.513000 audit[2278]: USER_ACCT pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:27.514373 sudo[2278]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 19:40:27.514000 audit[2278]: CRED_REFR pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:27.514590 sudo[2278]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:40:27.515000 audit[2278]: USER_START pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:28.183165 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 19:40:28.189044 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 19:40:28.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:28.189462 systemd[1]: Reached target network-online.target. Apr 12 19:40:28.190833 systemd[1]: Starting docker.service... Apr 12 19:40:28.241726 env[2299]: time="2024-04-12T19:40:28.241681880Z" level=info msg="Starting up" Apr 12 19:40:28.243187 env[2299]: time="2024-04-12T19:40:28.243167320Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 19:40:28.243219 env[2299]: time="2024-04-12T19:40:28.243188240Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 19:40:28.243258 env[2299]: time="2024-04-12T19:40:28.243246640Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 19:40:28.243285 env[2299]: time="2024-04-12T19:40:28.243258840Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 19:40:28.245055 env[2299]: time="2024-04-12T19:40:28.245033680Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 19:40:28.245125 env[2299]: time="2024-04-12T19:40:28.245055040Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 19:40:28.245125 env[2299]: time="2024-04-12T19:40:28.245069400Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 19:40:28.245125 env[2299]: time="2024-04-12T19:40:28.245082560Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 19:40:28.258203 env[2299]: time="2024-04-12T19:40:28.258181800Z" level=info msg="Loading containers: start." Apr 12 19:40:28.301000 audit[2352]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.301000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc38a07c0 a2=0 a3=1 items=0 ppid=2299 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 19:40:28.303000 audit[2354]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.303000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd7b462f0 a2=0 a3=1 items=0 ppid=2299 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 19:40:28.304000 audit[2356]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.304000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe0b74fd0 a2=0 a3=1 items=0 ppid=2299 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 19:40:28.306000 audit[2358]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.306000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff4daf820 a2=0 a3=1 items=0 ppid=2299 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 19:40:28.308000 audit[2360]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.308000 audit[2360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf74a0e0 a2=0 a3=1 items=0 ppid=2299 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 19:40:28.337000 audit[2365]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.337000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd430bc30 a2=0 a3=1 items=0 ppid=2299 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 19:40:28.341000 audit[2367]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.341000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdb854c70 a2=0 a3=1 items=0 ppid=2299 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 19:40:28.342000 audit[2369]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.342000 audit[2369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd5b9cd60 a2=0 a3=1 items=0 ppid=2299 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 19:40:28.344000 audit[2371]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.344000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff2b9c100 a2=0 a3=1 items=0 ppid=2299 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:40:28.347000 audit[2375]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.347000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe40c4c00 a2=0 a3=1 items=0 ppid=2299 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:40:28.348000 audit[2376]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.348000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe31ae060 a2=0 a3=1 items=0 ppid=2299 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:40:28.368305 kernel: Initializing XFRM netlink socket Apr 12 19:40:28.390311 env[2299]: time="2024-04-12T19:40:28.390282480Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 19:40:28.391212 systemd-timesyncd[2061]: Network configuration changed, trying to establish connection. Apr 12 19:40:28.406000 audit[2385]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.406000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffcfa0a3b0 a2=0 a3=1 items=0 ppid=2299 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 19:40:28.418000 audit[2388]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.418000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd3722db0 a2=0 a3=1 items=0 ppid=2299 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 19:40:28.420000 audit[2391]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.420000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe604f740 a2=0 a3=1 items=0 ppid=2299 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.420000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 19:40:28.422000 audit[2393]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.422000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffdb0e98c0 a2=0 a3=1 items=0 ppid=2299 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.422000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 19:40:28.424000 audit[2395]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.424000 audit[2395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffffd8e3ae0 a2=0 a3=1 items=0 ppid=2299 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 19:40:28.425000 audit[2397]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.425000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffdf52a190 a2=0 a3=1 items=0 ppid=2299 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 19:40:28.427000 audit[2399]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.427000 audit[2399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdb628480 a2=0 a3=1 items=0 ppid=2299 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 19:40:28.433000 audit[2402]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.433000 audit[2402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd3928730 a2=0 a3=1 items=0 ppid=2299 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 19:40:28.435000 audit[2404]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.435000 audit[2404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe4625a50 a2=0 a3=1 items=0 ppid=2299 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.435000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 19:40:28.437000 audit[2406]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.437000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe4a80660 a2=0 a3=1 items=0 ppid=2299 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.437000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 19:40:28.439000 audit[2408]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.439000 audit[2408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff4b00cb0 a2=0 a3=1 items=0 ppid=2299 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 19:40:28.439675 systemd-networkd[1940]: docker0: Link UP Apr 12 19:40:28.448000 audit[2419]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.448000 audit[2419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff2f291b0 a2=0 a3=1 items=0 ppid=2299 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:40:28.449000 audit[2420]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:28.449000 audit[2420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc1d941b0 a2=0 a3=1 items=0 ppid=2299 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:28.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 19:40:28.449864 env[2299]: time="2024-04-12T19:40:28.449840040Z" level=info msg="Loading containers: done." Apr 12 19:40:28.462446 env[2299]: time="2024-04-12T19:40:28.462419040Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 19:40:28.462578 env[2299]: time="2024-04-12T19:40:28.462564400Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 19:40:28.462670 env[2299]: time="2024-04-12T19:40:28.462660440Z" level=info msg="Daemon has completed initialization" Apr 12 19:40:28.470293 systemd[1]: Started docker.service. Apr 12 19:40:28.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:28.474133 env[2299]: time="2024-04-12T19:40:28.474036440Z" level=info msg="API listen on /run/docker.sock" Apr 12 19:40:28.493663 systemd[1]: Reloading. Apr 12 19:40:28.528269 /usr/lib/systemd/system-generators/torcx-generator[2471]: time="2024-04-12T19:40:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:40:28.528293 /usr/lib/systemd/system-generators/torcx-generator[2471]: time="2024-04-12T19:40:28Z" level=info msg="torcx already run" Apr 12 19:40:28.600787 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:40:28.600800 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:40:28.619805 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit: BPF prog-id=34 op=LOAD Apr 12 19:40:28.688000 audit: BPF prog-id=18 op=UNLOAD Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit: BPF prog-id=35 op=LOAD Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.688000 audit: BPF prog-id=36 op=LOAD Apr 12 19:40:28.688000 audit: BPF prog-id=19 op=UNLOAD Apr 12 19:40:28.688000 audit: BPF prog-id=20 op=UNLOAD Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.689000 audit: BPF prog-id=37 op=LOAD Apr 12 19:40:28.689000 audit: BPF prog-id=23 op=UNLOAD Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit: BPF prog-id=38 op=LOAD Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.690000 audit: BPF prog-id=39 op=LOAD Apr 12 19:40:28.690000 audit: BPF prog-id=21 op=UNLOAD Apr 12 19:40:28.690000 audit: BPF prog-id=22 op=UNLOAD Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.691000 audit: BPF prog-id=40 op=LOAD Apr 12 19:40:28.691000 audit: BPF prog-id=32 op=UNLOAD Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.692000 audit: BPF prog-id=41 op=LOAD Apr 12 19:40:28.692000 audit: BPF prog-id=27 op=UNLOAD Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.693000 audit: BPF prog-id=42 op=LOAD Apr 12 19:40:28.693000 audit: BPF prog-id=29 op=UNLOAD Apr 12 19:40:28.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit: BPF prog-id=43 op=LOAD Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit: BPF prog-id=44 op=LOAD Apr 12 19:40:28.694000 audit: BPF prog-id=30 op=UNLOAD Apr 12 19:40:28.694000 audit: BPF prog-id=31 op=UNLOAD Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.694000 audit: BPF prog-id=45 op=LOAD Apr 12 19:40:28.694000 audit: BPF prog-id=28 op=UNLOAD Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit: BPF prog-id=46 op=LOAD Apr 12 19:40:28.696000 audit: BPF prog-id=24 op=UNLOAD Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit: BPF prog-id=47 op=LOAD Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:28.697000 audit: BPF prog-id=48 op=LOAD Apr 12 19:40:28.697000 audit: BPF prog-id=25 op=UNLOAD Apr 12 19:40:28.697000 audit: BPF prog-id=26 op=UNLOAD Apr 12 19:40:28.703732 systemd[1]: Started kubelet.service. Apr 12 19:40:28.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:27.851153 systemd-resolved[2058]: Clock change detected. Flushing caches. Apr 12 19:40:27.882369 systemd-journald[1912]: Time jumped backwards, rotating. Apr 12 19:40:27.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:40:27.882481 kubelet[2525]: E0412 19:40:27.875771 2525 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:40:27.851333 systemd-timesyncd[2061]: Contacted time server [2600:3c02:e000:74::123:0]:123 (2.flatcar.pool.ntp.org). Apr 12 19:40:27.851378 systemd-timesyncd[2061]: Initial clock synchronization to Fri 2024-04-12 19:40:27.851110 UTC. Apr 12 19:40:27.877591 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:40:27.877702 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:40:28.043226 env[2125]: time="2024-04-12T19:40:28.043191286Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 19:40:28.462020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount207862522.mount: Deactivated successfully. Apr 12 19:40:31.215642 env[2125]: time="2024-04-12T19:40:31.215599526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:31.217096 env[2125]: time="2024-04-12T19:40:31.217064566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:31.219566 env[2125]: time="2024-04-12T19:40:31.219542326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:31.223751 env[2125]: time="2024-04-12T19:40:31.223727806Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:31.224399 env[2125]: time="2024-04-12T19:40:31.224370366Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794\"" Apr 12 19:40:31.234390 env[2125]: time="2024-04-12T19:40:31.234367646Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 19:40:34.137185 env[2125]: time="2024-04-12T19:40:34.137140806Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:34.138182 env[2125]: time="2024-04-12T19:40:34.138155286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:34.139792 env[2125]: time="2024-04-12T19:40:34.139775766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:34.141231 env[2125]: time="2024-04-12T19:40:34.141206286Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:34.141916 env[2125]: time="2024-04-12T19:40:34.141894406Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195\"" Apr 12 19:40:34.152605 env[2125]: time="2024-04-12T19:40:34.152586846Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 19:40:35.624292 env[2125]: time="2024-04-12T19:40:35.624246486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:35.629039 env[2125]: time="2024-04-12T19:40:35.629003606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:35.630394 env[2125]: time="2024-04-12T19:40:35.630371286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:35.631846 env[2125]: time="2024-04-12T19:40:35.631827366Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:35.632519 env[2125]: time="2024-04-12T19:40:35.632493166Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb\"" Apr 12 19:40:35.642845 env[2125]: time="2024-04-12T19:40:35.642823126Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 19:40:36.539982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount367529385.mount: Deactivated successfully. Apr 12 19:40:37.369201 env[2125]: time="2024-04-12T19:40:37.369163006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:37.369834 env[2125]: time="2024-04-12T19:40:37.369810166Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:37.370821 env[2125]: time="2024-04-12T19:40:37.370805966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:37.371687 env[2125]: time="2024-04-12T19:40:37.371672806Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:37.372176 env[2125]: time="2024-04-12T19:40:37.372148046Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775\"" Apr 12 19:40:37.382294 env[2125]: time="2024-04-12T19:40:37.382264366Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 19:40:37.721384 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3891896101.mount: Deactivated successfully. Apr 12 19:40:38.100436 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 19:40:38.100679 systemd[1]: Stopped kubelet.service. Apr 12 19:40:38.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:38.104335 systemd[1]: Started kubelet.service. Apr 12 19:40:38.112308 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 19:40:38.112401 kernel: audit: type=1130 audit(1712950838.100:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:38.145239 kubelet[2666]: E0412 19:40:38.145209 2666 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:40:38.147923 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:40:38.148128 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:40:38.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:38.191949 kernel: audit: type=1131 audit(1712950838.100:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:38.192083 kernel: audit: type=1130 audit(1712950838.105:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:38.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:38.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:40:38.270670 kernel: audit: type=1131 audit(1712950838.148:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:40:38.968557 env[2125]: time="2024-04-12T19:40:38.968520806Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:38.969555 env[2125]: time="2024-04-12T19:40:38.969526766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:38.971265 env[2125]: time="2024-04-12T19:40:38.971238366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:38.972818 env[2125]: time="2024-04-12T19:40:38.972798246Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:38.973558 env[2125]: time="2024-04-12T19:40:38.973530806Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Apr 12 19:40:38.983921 env[2125]: time="2024-04-12T19:40:38.983899086Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 19:40:39.218734 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2051975683.mount: Deactivated successfully. Apr 12 19:40:39.219672 env[2125]: time="2024-04-12T19:40:39.219643446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:39.220336 env[2125]: time="2024-04-12T19:40:39.220312286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:39.221803 env[2125]: time="2024-04-12T19:40:39.221785766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:39.222734 env[2125]: time="2024-04-12T19:40:39.222718446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:39.223275 env[2125]: time="2024-04-12T19:40:39.223251446Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 19:40:39.232821 env[2125]: time="2024-04-12T19:40:39.232798446Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 19:40:39.529194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount58439210.mount: Deactivated successfully. Apr 12 19:40:43.539757 env[2125]: time="2024-04-12T19:40:43.539710766Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:43.540758 env[2125]: time="2024-04-12T19:40:43.540733086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:43.542473 env[2125]: time="2024-04-12T19:40:43.542449846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:43.544050 env[2125]: time="2024-04-12T19:40:43.544031446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:43.545664 env[2125]: time="2024-04-12T19:40:43.545640366Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Apr 12 19:40:48.100598 systemd[1]: Stopped kubelet.service. Apr 12 19:40:48.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:48.116412 systemd[1]: Reloading. Apr 12 19:40:48.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:48.170567 /usr/lib/systemd/system-generators/torcx-generator[2872]: time="2024-04-12T19:40:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:40:48.170591 /usr/lib/systemd/system-generators/torcx-generator[2872]: time="2024-04-12T19:40:48Z" level=info msg="torcx already run" Apr 12 19:40:48.180331 kernel: audit: type=1130 audit(1712950848.100:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:48.180362 kernel: audit: type=1131 audit(1712950848.100:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:48.243927 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:40:48.243941 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:40:48.263109 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408420 kernel: audit: type=1400 audit(1712950848.331:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408510 kernel: audit: type=1400 audit(1712950848.331:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408549 kernel: audit: type=1400 audit(1712950848.331:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.485552 kernel: audit: type=1400 audit(1712950848.331:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.485629 kernel: audit: type=1400 audit(1712950848.331:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.563049 kernel: audit: type=1400 audit(1712950848.331:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.563119 kernel: audit: type=1400 audit(1712950848.331:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.601993 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit: BPF prog-id=49 op=LOAD Apr 12 19:40:48.369000 audit: BPF prog-id=34 op=UNLOAD Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit: BPF prog-id=50 op=LOAD Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit: BPF prog-id=51 op=LOAD Apr 12 19:40:48.446000 audit: BPF prog-id=35 op=UNLOAD Apr 12 19:40:48.446000 audit: BPF prog-id=36 op=UNLOAD Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.485000 audit: BPF prog-id=52 op=LOAD Apr 12 19:40:48.485000 audit: BPF prog-id=37 op=UNLOAD Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit: BPF prog-id=53 op=LOAD Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.562000 audit: BPF prog-id=54 op=LOAD Apr 12 19:40:48.562000 audit: BPF prog-id=38 op=UNLOAD Apr 12 19:40:48.562000 audit: BPF prog-id=39 op=UNLOAD Apr 12 19:40:48.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.613000 audit: BPF prog-id=55 op=LOAD Apr 12 19:40:48.613000 audit: BPF prog-id=40 op=UNLOAD Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit: BPF prog-id=56 op=LOAD Apr 12 19:40:48.615000 audit: BPF prog-id=41 op=UNLOAD Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit: BPF prog-id=57 op=LOAD Apr 12 19:40:48.616000 audit: BPF prog-id=42 op=UNLOAD Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit: BPF prog-id=58 op=LOAD Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.616000 audit: BPF prog-id=59 op=LOAD Apr 12 19:40:48.616000 audit: BPF prog-id=43 op=UNLOAD Apr 12 19:40:48.616000 audit: BPF prog-id=44 op=UNLOAD Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.617000 audit: BPF prog-id=60 op=LOAD Apr 12 19:40:48.617000 audit: BPF prog-id=45 op=UNLOAD Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit: BPF prog-id=61 op=LOAD Apr 12 19:40:48.619000 audit: BPF prog-id=46 op=UNLOAD Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit: BPF prog-id=62 op=LOAD Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:48.619000 audit: BPF prog-id=63 op=LOAD Apr 12 19:40:48.619000 audit: BPF prog-id=47 op=UNLOAD Apr 12 19:40:48.619000 audit: BPF prog-id=48 op=UNLOAD Apr 12 19:40:48.629835 systemd[1]: Started kubelet.service. Apr 12 19:40:48.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:48.663131 kubelet[2927]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:40:48.663131 kubelet[2927]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:40:48.663131 kubelet[2927]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:40:48.663429 kubelet[2927]: I0412 19:40:48.663130 2927 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:40:49.770246 kubelet[2927]: I0412 19:40:49.770221 2927 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:40:49.770246 kubelet[2927]: I0412 19:40:49.770247 2927 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:40:49.770496 kubelet[2927]: I0412 19:40:49.770419 2927 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:40:49.775807 kubelet[2927]: E0412 19:40:49.775790 2927 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.62.230:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.777581 kubelet[2927]: I0412 19:40:49.777562 2927 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:40:49.797133 kubelet[2927]: I0412 19:40:49.797111 2927 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:40:49.797369 kubelet[2927]: I0412 19:40:49.797359 2927 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:40:49.797517 kubelet[2927]: I0412 19:40:49.797505 2927 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:40:49.797592 kubelet[2927]: I0412 19:40:49.797526 2927 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:40:49.797592 kubelet[2927]: I0412 19:40:49.797535 2927 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:40:49.797651 kubelet[2927]: I0412 19:40:49.797642 2927 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:40:49.798054 kubelet[2927]: I0412 19:40:49.798047 2927 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:40:49.798078 kubelet[2927]: I0412 19:40:49.798062 2927 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:40:49.798097 kubelet[2927]: I0412 19:40:49.798082 2927 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:40:49.798097 kubelet[2927]: I0412 19:40:49.798092 2927 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:40:49.799921 kubelet[2927]: I0412 19:40:49.799907 2927 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:40:49.799951 kubelet[2927]: W0412 19:40:49.799913 2927 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://147.75.62.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-f02954802e&limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.799980 kubelet[2927]: E0412 19:40:49.799972 2927 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.62.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-f02954802e&limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.800005 kubelet[2927]: W0412 19:40:49.799886 2927 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://147.75.62.230:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.800028 kubelet[2927]: E0412 19:40:49.800006 2927 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.62.230:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.800365 kubelet[2927]: I0412 19:40:49.800354 2927 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:40:49.800464 kubelet[2927]: W0412 19:40:49.800456 2927 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 19:40:49.801164 kubelet[2927]: I0412 19:40:49.801153 2927 server.go:1256] "Started kubelet" Apr 12 19:40:49.801332 kubelet[2927]: I0412 19:40:49.801323 2927 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:40:49.801357 kubelet[2927]: I0412 19:40:49.801327 2927 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:40:49.801540 kubelet[2927]: I0412 19:40:49.801531 2927 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:40:49.801000 audit[2927]: AVC avc: denied { mac_admin } for pid=2927 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:49.801000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:40:49.801000 audit[2927]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001112b10 a1=40002be9d8 a2=4001112ae0 a3=25 items=0 ppid=1 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.801000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:40:49.801000 audit[2927]: AVC avc: denied { mac_admin } for pid=2927 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:49.801000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:40:49.801000 audit[2927]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400170b520 a1=40002be9f0 a2=4001112ba0 a3=25 items=0 ppid=1 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.801000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:40:49.802346 kubelet[2927]: I0412 19:40:49.802136 2927 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:40:49.802346 kubelet[2927]: I0412 19:40:49.802169 2927 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:40:49.802346 kubelet[2927]: I0412 19:40:49.802229 2927 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:40:49.802346 kubelet[2927]: E0412 19:40:49.802297 2927 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://147.75.62.230:6443/api/v1/namespaces/default/events\": dial tcp 147.75.62.230:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.3-a-f02954802e.17c59fb8e8199796 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.3-a-f02954802e,UID:ci-3510.3.3-a-f02954802e,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.3-a-f02954802e,},FirstTimestamp:2024-04-12 19:40:49.801131926 +0000 UTC m=+1.167828361,LastTimestamp:2024-04-12 19:40:49.801131926 +0000 UTC m=+1.167828361,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.3-a-f02954802e,}" Apr 12 19:40:49.802451 kubelet[2927]: I0412 19:40:49.802343 2927 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:40:49.802451 kubelet[2927]: I0412 19:40:49.802401 2927 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:40:49.802493 kubelet[2927]: I0412 19:40:49.802464 2927 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:40:49.802537 kubelet[2927]: E0412 19:40:49.802522 2927 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.62.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-f02954802e?timeout=10s\": dial tcp 147.75.62.230:6443: connect: connection refused" interval="200ms" Apr 12 19:40:49.802710 kubelet[2927]: W0412 19:40:49.802667 2927 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://147.75.62.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.802760 kubelet[2927]: E0412 19:40:49.802718 2927 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.62.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.802786 kubelet[2927]: I0412 19:40:49.802761 2927 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:40:49.802850 kubelet[2927]: I0412 19:40:49.802837 2927 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:40:49.803233 kubelet[2927]: I0412 19:40:49.803216 2927 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:40:49.803312 kubelet[2927]: E0412 19:40:49.803301 2927 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:40:49.803515 kubelet[2927]: I0412 19:40:49.803500 2927 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:40:49.804000 audit[2956]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.804000 audit[2956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc8b4d3e0 a2=0 a3=1 items=0 ppid=2927 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:40:49.805000 audit[2957]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.805000 audit[2957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd59151a0 a2=0 a3=1 items=0 ppid=2927 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:40:49.807000 audit[2959]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.807000 audit[2959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa506540 a2=0 a3=1 items=0 ppid=2927 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:40:49.809000 audit[2967]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.809000 audit[2967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9422fa0 a2=0 a3=1 items=0 ppid=2927 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:40:49.815000 audit[2970]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.815000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffccca3140 a2=0 a3=1 items=0 ppid=2927 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 19:40:49.816219 kubelet[2927]: I0412 19:40:49.816199 2927 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:40:49.816000 audit[2972]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:40:49.816000 audit[2972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd5854900 a2=0 a3=1 items=0 ppid=2927 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:40:49.816000 audit[2973]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.816000 audit[2973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff301ce20 a2=0 a3=1 items=0 ppid=2927 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:40:49.817189 kubelet[2927]: I0412 19:40:49.817156 2927 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:40:49.817189 kubelet[2927]: I0412 19:40:49.817172 2927 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:40:49.817189 kubelet[2927]: I0412 19:40:49.817187 2927 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:40:49.817246 kubelet[2927]: E0412 19:40:49.817228 2927 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 19:40:49.817605 kubelet[2927]: W0412 19:40:49.817566 2927 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://147.75.62.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.817634 kubelet[2927]: E0412 19:40:49.817617 2927 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.62.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.62.230:6443: connect: connection refused Apr 12 19:40:49.817000 audit[2974]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.817000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5a17aa0 a2=0 a3=1 items=0 ppid=2927 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:40:49.817000 audit[2975]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:40:49.817000 audit[2975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcebe7b90 a2=0 a3=1 items=0 ppid=2927 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:40:49.818000 audit[2976]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:40:49.818000 audit[2976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9d24c90 a2=0 a3=1 items=0 ppid=2927 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:40:49.818000 audit[2977]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:40:49.818000 audit[2977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe9645510 a2=0 a3=1 items=0 ppid=2927 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:40:49.819000 audit[2978]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:40:49.819000 audit[2978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd7c49d40 a2=0 a3=1 items=0 ppid=2927 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:40:49.841556 kubelet[2927]: I0412 19:40:49.841542 2927 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:40:49.841587 kubelet[2927]: I0412 19:40:49.841558 2927 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:40:49.841587 kubelet[2927]: I0412 19:40:49.841576 2927 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:40:49.842145 kubelet[2927]: I0412 19:40:49.842131 2927 policy_none.go:49] "None policy: Start" Apr 12 19:40:49.842538 kubelet[2927]: I0412 19:40:49.842527 2927 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:40:49.842560 kubelet[2927]: I0412 19:40:49.842547 2927 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:40:49.845854 systemd[1]: Created slice kubepods.slice. Apr 12 19:40:49.849338 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 19:40:49.851659 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 19:40:49.863910 kubelet[2927]: I0412 19:40:49.863893 2927 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:40:49.863000 audit[2927]: AVC avc: denied { mac_admin } for pid=2927 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:49.863000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:40:49.863000 audit[2927]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000799410 a1=40002bf680 a2=40007993b0 a3=25 items=0 ppid=1 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:49.863000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:40:49.864052 kubelet[2927]: I0412 19:40:49.863952 2927 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:40:49.864125 kubelet[2927]: I0412 19:40:49.864116 2927 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:40:49.864752 kubelet[2927]: E0412 19:40:49.864738 2927 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-f02954802e\" not found" Apr 12 19:40:49.905016 kubelet[2927]: I0412 19:40:49.904989 2927 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:49.905393 kubelet[2927]: E0412 19:40:49.905380 2927 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.62.230:6443/api/v1/nodes\": dial tcp 147.75.62.230:6443: connect: connection refused" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:49.917493 kubelet[2927]: I0412 19:40:49.917483 2927 topology_manager.go:215] "Topology Admit Handler" podUID="70a1cafcc9feec4a77e7e022bd12a146" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-f02954802e" Apr 12 19:40:49.918887 kubelet[2927]: I0412 19:40:49.918873 2927 topology_manager.go:215] "Topology Admit Handler" podUID="2f93c7819d583e7c7fb8939ef447aa3e" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:49.920259 kubelet[2927]: I0412 19:40:49.920240 2927 topology_manager.go:215] "Topology Admit Handler" podUID="1147ee14cd4f4adc377c7e572c495df7" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:49.923564 systemd[1]: Created slice kubepods-burstable-pod70a1cafcc9feec4a77e7e022bd12a146.slice. Apr 12 19:40:49.952919 systemd[1]: Created slice kubepods-burstable-pod2f93c7819d583e7c7fb8939ef447aa3e.slice. Apr 12 19:40:49.955974 systemd[1]: Created slice kubepods-burstable-pod1147ee14cd4f4adc377c7e572c495df7.slice. Apr 12 19:40:50.003427 kubelet[2927]: E0412 19:40:50.003402 2927 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.62.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-f02954802e?timeout=10s\": dial tcp 147.75.62.230:6443: connect: connection refused" interval="400ms" Apr 12 19:40:50.103704 kubelet[2927]: I0412 19:40:50.103680 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103763 kubelet[2927]: I0412 19:40:50.103716 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/70a1cafcc9feec4a77e7e022bd12a146-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-f02954802e\" (UID: \"70a1cafcc9feec4a77e7e022bd12a146\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103763 kubelet[2927]: I0412 19:40:50.103737 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2f93c7819d583e7c7fb8939ef447aa3e-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-f02954802e\" (UID: \"2f93c7819d583e7c7fb8939ef447aa3e\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103871 kubelet[2927]: I0412 19:40:50.103845 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2f93c7819d583e7c7fb8939ef447aa3e-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-f02954802e\" (UID: \"2f93c7819d583e7c7fb8939ef447aa3e\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103896 kubelet[2927]: I0412 19:40:50.103891 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103918 kubelet[2927]: I0412 19:40:50.103915 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103943 kubelet[2927]: I0412 19:40:50.103935 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.103964 kubelet[2927]: I0412 19:40:50.103955 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.104009 kubelet[2927]: I0412 19:40:50.104000 2927 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2f93c7819d583e7c7fb8939ef447aa3e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-f02954802e\" (UID: \"2f93c7819d583e7c7fb8939ef447aa3e\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.106980 kubelet[2927]: I0412 19:40:50.106966 2927 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.107229 kubelet[2927]: E0412 19:40:50.107217 2927 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.62.230:6443/api/v1/nodes\": dial tcp 147.75.62.230:6443: connect: connection refused" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.251574 env[2125]: time="2024-04-12T19:40:50.251522606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-f02954802e,Uid:70a1cafcc9feec4a77e7e022bd12a146,Namespace:kube-system,Attempt:0,}" Apr 12 19:40:50.255010 env[2125]: time="2024-04-12T19:40:50.254968726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-f02954802e,Uid:2f93c7819d583e7c7fb8939ef447aa3e,Namespace:kube-system,Attempt:0,}" Apr 12 19:40:50.258398 env[2125]: time="2024-04-12T19:40:50.258373806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-f02954802e,Uid:1147ee14cd4f4adc377c7e572c495df7,Namespace:kube-system,Attempt:0,}" Apr 12 19:40:50.404452 kubelet[2927]: E0412 19:40:50.404372 2927 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.62.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-f02954802e?timeout=10s\": dial tcp 147.75.62.230:6443: connect: connection refused" interval="800ms" Apr 12 19:40:50.509523 kubelet[2927]: I0412 19:40:50.509502 2927 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.509783 kubelet[2927]: E0412 19:40:50.509770 2927 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.62.230:6443/api/v1/nodes\": dial tcp 147.75.62.230:6443: connect: connection refused" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:50.543846 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1702294659.mount: Deactivated successfully. Apr 12 19:40:50.544660 env[2125]: time="2024-04-12T19:40:50.544634086Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.545368 env[2125]: time="2024-04-12T19:40:50.545351726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.546152 env[2125]: time="2024-04-12T19:40:50.546128206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.548913 env[2125]: time="2024-04-12T19:40:50.548893166Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.551556 env[2125]: time="2024-04-12T19:40:50.551533966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.554239 env[2125]: time="2024-04-12T19:40:50.554218326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.554905 env[2125]: time="2024-04-12T19:40:50.554885646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.555540 env[2125]: time="2024-04-12T19:40:50.555523246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.556159 env[2125]: time="2024-04-12T19:40:50.556141566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.557151 env[2125]: time="2024-04-12T19:40:50.557110486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.558179 env[2125]: time="2024-04-12T19:40:50.558149486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.559601 env[2125]: time="2024-04-12T19:40:50.559575126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:40:50.565226 env[2125]: time="2024-04-12T19:40:50.565180126Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:40:50.565226 env[2125]: time="2024-04-12T19:40:50.565218166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:40:50.565309 env[2125]: time="2024-04-12T19:40:50.565228486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:40:50.565331 env[2125]: time="2024-04-12T19:40:50.565277366Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:40:50.565331 env[2125]: time="2024-04-12T19:40:50.565315006Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:40:50.565368 env[2125]: time="2024-04-12T19:40:50.565326126Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:40:50.565368 env[2125]: time="2024-04-12T19:40:50.565338886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:40:50.565420 env[2125]: time="2024-04-12T19:40:50.565376566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:40:50.565420 env[2125]: time="2024-04-12T19:40:50.565389926Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:40:50.565457 env[2125]: time="2024-04-12T19:40:50.565439126Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c3b5297c32499881575b4166f0a81f53f25b3ed9812081c10484b8ccb02d6e7 pid=3005 runtime=io.containerd.runc.v2 Apr 12 19:40:50.565510 env[2125]: time="2024-04-12T19:40:50.565471926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ccd8e3bf4dbdbcfcb9536c728b84983bb991579f1c94c8b7da67776bc0f5b110 pid=3007 runtime=io.containerd.runc.v2 Apr 12 19:40:50.565531 env[2125]: time="2024-04-12T19:40:50.565490326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b76635af3fa845228e61a711cb1c43e9056b53aa1a9bf317d8b6ab30e5dc1fe4 pid=3006 runtime=io.containerd.runc.v2 Apr 12 19:40:50.576983 systemd[1]: Started cri-containerd-3c3b5297c32499881575b4166f0a81f53f25b3ed9812081c10484b8ccb02d6e7.scope. Apr 12 19:40:50.578384 systemd[1]: Started cri-containerd-b76635af3fa845228e61a711cb1c43e9056b53aa1a9bf317d8b6ab30e5dc1fe4.scope. Apr 12 19:40:50.579735 systemd[1]: Started cri-containerd-ccd8e3bf4dbdbcfcb9536c728b84983bb991579f1c94c8b7da67776bc0f5b110.scope. Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.596000 audit: BPF prog-id=64 op=LOAD Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3007 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363643865336266346462646263666362393533366337323862383439 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363643865336266346462646263666362393533366337323862383439 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit: BPF prog-id=65 op=LOAD Apr 12 19:40:50.597000 audit[3035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3007 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363643865336266346462646263666362393533366337323862383439 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit: BPF prog-id=66 op=LOAD Apr 12 19:40:50.597000 audit[3035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3007 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363643865336266346462646263666362393533366337323862383439 Apr 12 19:40:50.597000 audit: BPF prog-id=66 op=UNLOAD Apr 12 19:40:50.597000 audit: BPF prog-id=65 op=UNLOAD Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.597000 audit: BPF prog-id=67 op=LOAD Apr 12 19:40:50.597000 audit[3035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3007 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363643865336266346462646263666362393533366337323862383439 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit: BPF prog-id=68 op=LOAD Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3006 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363633356166336661383435323238653631613731316362316334 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3006 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363633356166336661383435323238653631613731316362316334 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit: BPF prog-id=69 op=LOAD Apr 12 19:40:50.598000 audit[3034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3006 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363633356166336661383435323238653631613731316362316334 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit: BPF prog-id=70 op=LOAD Apr 12 19:40:50.598000 audit[3034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3006 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363633356166336661383435323238653631613731316362316334 Apr 12 19:40:50.598000 audit: BPF prog-id=70 op=UNLOAD Apr 12 19:40:50.598000 audit: BPF prog-id=69 op=UNLOAD Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.598000 audit: BPF prog-id=71 op=LOAD Apr 12 19:40:50.598000 audit[3034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3006 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363633356166336661383435323238653631613731316362316334 Apr 12 19:40:50.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit: BPF prog-id=72 op=LOAD Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3005 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363336235323937633332343939383831353735623431363666306138 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3005 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363336235323937633332343939383831353735623431363666306138 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit: BPF prog-id=73 op=LOAD Apr 12 19:40:50.599000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3005 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363336235323937633332343939383831353735623431363666306138 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit: BPF prog-id=74 op=LOAD Apr 12 19:40:50.599000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3005 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363336235323937633332343939383831353735623431363666306138 Apr 12 19:40:50.599000 audit: BPF prog-id=74 op=UNLOAD Apr 12 19:40:50.599000 audit: BPF prog-id=73 op=UNLOAD Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.599000 audit: BPF prog-id=75 op=LOAD Apr 12 19:40:50.599000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3005 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363336235323937633332343939383831353735623431363666306138 Apr 12 19:40:50.612720 env[2125]: time="2024-04-12T19:40:50.612686006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-f02954802e,Uid:2f93c7819d583e7c7fb8939ef447aa3e,Namespace:kube-system,Attempt:0,} returns sandbox id \"ccd8e3bf4dbdbcfcb9536c728b84983bb991579f1c94c8b7da67776bc0f5b110\"" Apr 12 19:40:50.613427 env[2125]: time="2024-04-12T19:40:50.613399726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-f02954802e,Uid:1147ee14cd4f4adc377c7e572c495df7,Namespace:kube-system,Attempt:0,} returns sandbox id \"b76635af3fa845228e61a711cb1c43e9056b53aa1a9bf317d8b6ab30e5dc1fe4\"" Apr 12 19:40:50.613549 env[2125]: time="2024-04-12T19:40:50.613498686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-f02954802e,Uid:70a1cafcc9feec4a77e7e022bd12a146,Namespace:kube-system,Attempt:0,} returns sandbox id \"3c3b5297c32499881575b4166f0a81f53f25b3ed9812081c10484b8ccb02d6e7\"" Apr 12 19:40:50.615543 env[2125]: time="2024-04-12T19:40:50.615506606Z" level=info msg="CreateContainer within sandbox \"3c3b5297c32499881575b4166f0a81f53f25b3ed9812081c10484b8ccb02d6e7\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 19:40:50.615626 env[2125]: time="2024-04-12T19:40:50.615532486Z" level=info msg="CreateContainer within sandbox \"b76635af3fa845228e61a711cb1c43e9056b53aa1a9bf317d8b6ab30e5dc1fe4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 19:40:50.615715 env[2125]: time="2024-04-12T19:40:50.615682166Z" level=info msg="CreateContainer within sandbox \"ccd8e3bf4dbdbcfcb9536c728b84983bb991579f1c94c8b7da67776bc0f5b110\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 19:40:50.622898 env[2125]: time="2024-04-12T19:40:50.622862006Z" level=info msg="CreateContainer within sandbox \"b76635af3fa845228e61a711cb1c43e9056b53aa1a9bf317d8b6ab30e5dc1fe4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"05a8bbaee5d29a6664eba8a59efb077e04532cb6a97db40ab16ee367872b8285\"" Apr 12 19:40:50.623022 env[2125]: time="2024-04-12T19:40:50.622930086Z" level=info msg="CreateContainer within sandbox \"3c3b5297c32499881575b4166f0a81f53f25b3ed9812081c10484b8ccb02d6e7\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e1b733cf454cff5954f369a91f528e3e27b3ca2fcc9b9f6872c0053a8137bc4b\"" Apr 12 19:40:50.623179 env[2125]: time="2024-04-12T19:40:50.623146366Z" level=info msg="CreateContainer within sandbox \"ccd8e3bf4dbdbcfcb9536c728b84983bb991579f1c94c8b7da67776bc0f5b110\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"78a7156f8b8bcb79c1475560196fc7ed74bc0baae01376e3fbe53ef7ff0e72f4\"" Apr 12 19:40:50.623403 env[2125]: time="2024-04-12T19:40:50.623380966Z" level=info msg="StartContainer for \"05a8bbaee5d29a6664eba8a59efb077e04532cb6a97db40ab16ee367872b8285\"" Apr 12 19:40:50.623510 env[2125]: time="2024-04-12T19:40:50.623486926Z" level=info msg="StartContainer for \"78a7156f8b8bcb79c1475560196fc7ed74bc0baae01376e3fbe53ef7ff0e72f4\"" Apr 12 19:40:50.623532 env[2125]: time="2024-04-12T19:40:50.623518966Z" level=info msg="StartContainer for \"e1b733cf454cff5954f369a91f528e3e27b3ca2fcc9b9f6872c0053a8137bc4b\"" Apr 12 19:40:50.637456 systemd[1]: Started cri-containerd-05a8bbaee5d29a6664eba8a59efb077e04532cb6a97db40ab16ee367872b8285.scope. Apr 12 19:40:50.638560 systemd[1]: Started cri-containerd-78a7156f8b8bcb79c1475560196fc7ed74bc0baae01376e3fbe53ef7ff0e72f4.scope. Apr 12 19:40:50.639600 systemd[1]: Started cri-containerd-e1b733cf454cff5954f369a91f528e3e27b3ca2fcc9b9f6872c0053a8137bc4b.scope. Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit: BPF prog-id=76 op=LOAD Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3005 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623733336366343534636666353935346633363961393166353238 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3005 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623733336366343534636666353935346633363961393166353238 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit: BPF prog-id=77 op=LOAD Apr 12 19:40:50.658000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3005 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623733336366343534636666353935346633363961393166353238 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit: BPF prog-id=78 op=LOAD Apr 12 19:40:50.658000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3005 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623733336366343534636666353935346633363961393166353238 Apr 12 19:40:50.658000 audit: BPF prog-id=78 op=UNLOAD Apr 12 19:40:50.658000 audit: BPF prog-id=77 op=UNLOAD Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.658000 audit: BPF prog-id=79 op=LOAD Apr 12 19:40:50.658000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3005 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531623733336366343534636666353935346633363961393166353238 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit: BPF prog-id=80 op=LOAD Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3007 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738613731353666386238626362373963313437353536303139366663 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3007 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738613731353666386238626362373963313437353536303139366663 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit: BPF prog-id=81 op=LOAD Apr 12 19:40:50.659000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3007 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738613731353666386238626362373963313437353536303139366663 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.659000 audit: BPF prog-id=82 op=LOAD Apr 12 19:40:50.659000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3007 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738613731353666386238626362373963313437353536303139366663 Apr 12 19:40:50.660000 audit: BPF prog-id=82 op=UNLOAD Apr 12 19:40:50.660000 audit: BPF prog-id=81 op=UNLOAD Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit: BPF prog-id=83 op=LOAD Apr 12 19:40:50.660000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3007 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738613731353666386238626362373963313437353536303139366663 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit: BPF prog-id=84 op=LOAD Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3006 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613862626165653564323961363636346562613861353965666230 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3006 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613862626165653564323961363636346562613861353965666230 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit: BPF prog-id=85 op=LOAD Apr 12 19:40:50.661000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3006 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613862626165653564323961363636346562613861353965666230 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit: BPF prog-id=86 op=LOAD Apr 12 19:40:50.661000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3006 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613862626165653564323961363636346562613861353965666230 Apr 12 19:40:50.661000 audit: BPF prog-id=86 op=UNLOAD Apr 12 19:40:50.661000 audit: BPF prog-id=85 op=UNLOAD Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:50.661000 audit: BPF prog-id=87 op=LOAD Apr 12 19:40:50.661000 audit[3125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3006 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:50.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035613862626165653564323961363636346562613861353965666230 Apr 12 19:40:50.673733 env[2125]: time="2024-04-12T19:40:50.673694646Z" level=info msg="StartContainer for \"e1b733cf454cff5954f369a91f528e3e27b3ca2fcc9b9f6872c0053a8137bc4b\" returns successfully" Apr 12 19:40:50.674732 env[2125]: time="2024-04-12T19:40:50.674703966Z" level=info msg="StartContainer for \"78a7156f8b8bcb79c1475560196fc7ed74bc0baae01376e3fbe53ef7ff0e72f4\" returns successfully" Apr 12 19:40:50.676573 env[2125]: time="2024-04-12T19:40:50.676542246Z" level=info msg="StartContainer for \"05a8bbaee5d29a6664eba8a59efb077e04532cb6a97db40ab16ee367872b8285\" returns successfully" Apr 12 19:40:51.311846 kubelet[2927]: I0412 19:40:51.311826 2927 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:52.262000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:52.262000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:52.262000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40005e6e00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:40:52.262000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40006c6960 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:40:52.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:40:52.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:40:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.124325 kernel: kauditd_printk_skb: 563 callbacks suppressed Apr 12 19:40:53.124397 kernel: audit: type=1400 audit(1712950853.112:689): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004ed82d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.232234 kernel: audit: type=1300 audit(1712950853.112:689): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004ed82d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.232352 kernel: audit: type=1327 audit(1712950853.112:689): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.328153 kernel: audit: type=1400 audit(1712950853.112:690): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.328196 kernel: audit: type=1300 audit(1712950853.112:690): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400619aa20 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400619aa20 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.437462 kernel: audit: type=1327 audit(1712950853.112:690): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.437527 kernel: audit: type=1400 audit(1712950853.112:691): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004ef7a10 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.545345 kernel: audit: type=1300 audit(1712950853.112:691): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004ef7a10 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.545404 kernel: audit: type=1327 audit(1712950853.112:691): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.650125 kernel: audit: type=1400 audit(1712950853.113:692): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004c14ab0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=54 a1=4005d16060 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:40:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4008622080 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:40:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:40:53.652838 kubelet[2927]: E0412 19:40:53.652814 2927 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.3-a-f02954802e\" not found" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:53.728784 kubelet[2927]: I0412 19:40:53.728729 2927 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:53.801881 kubelet[2927]: I0412 19:40:53.801854 2927 apiserver.go:52] "Watching apiserver" Apr 12 19:40:53.903290 kubelet[2927]: I0412 19:40:53.903263 2927 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:40:54.563134 kubelet[2927]: W0412 19:40:54.563116 2927 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:54.695112 kubelet[2927]: W0412 19:40:54.695093 2927 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:55.708338 systemd[1]: Reloading. Apr 12 19:40:55.743414 /usr/lib/systemd/system-generators/torcx-generator[3360]: time="2024-04-12T19:40:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:40:55.743439 /usr/lib/systemd/system-generators/torcx-generator[3360]: time="2024-04-12T19:40:55Z" level=info msg="torcx already run" Apr 12 19:40:55.816397 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:40:55.816410 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:40:55.835552 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit: BPF prog-id=88 op=LOAD Apr 12 19:40:55.914000 audit: BPF prog-id=84 op=UNLOAD Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.915000 audit: BPF prog-id=89 op=LOAD Apr 12 19:40:55.915000 audit: BPF prog-id=72 op=UNLOAD Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit: BPF prog-id=90 op=LOAD Apr 12 19:40:55.917000 audit: BPF prog-id=80 op=UNLOAD Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit: BPF prog-id=91 op=LOAD Apr 12 19:40:55.918000 audit: BPF prog-id=49 op=UNLOAD Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit: BPF prog-id=92 op=LOAD Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit: BPF prog-id=93 op=LOAD Apr 12 19:40:55.918000 audit: BPF prog-id=50 op=UNLOAD Apr 12 19:40:55.918000 audit: BPF prog-id=51 op=UNLOAD Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit: BPF prog-id=94 op=LOAD Apr 12 19:40:55.919000 audit: BPF prog-id=52 op=UNLOAD Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit: BPF prog-id=95 op=LOAD Apr 12 19:40:55.920000 audit: BPF prog-id=64 op=UNLOAD Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit: BPF prog-id=96 op=LOAD Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit: BPF prog-id=97 op=LOAD Apr 12 19:40:55.921000 audit: BPF prog-id=53 op=UNLOAD Apr 12 19:40:55.921000 audit: BPF prog-id=54 op=UNLOAD Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit: BPF prog-id=98 op=LOAD Apr 12 19:40:55.922000 audit: BPF prog-id=55 op=UNLOAD Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.922000 audit: BPF prog-id=99 op=LOAD Apr 12 19:40:55.923000 audit: BPF prog-id=76 op=UNLOAD Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit: BPF prog-id=100 op=LOAD Apr 12 19:40:55.924000 audit: BPF prog-id=56 op=UNLOAD Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.924000 audit: BPF prog-id=101 op=LOAD Apr 12 19:40:55.924000 audit: BPF prog-id=57 op=UNLOAD Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit: BPF prog-id=102 op=LOAD Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit: BPF prog-id=103 op=LOAD Apr 12 19:40:55.925000 audit: BPF prog-id=58 op=UNLOAD Apr 12 19:40:55.925000 audit: BPF prog-id=59 op=UNLOAD Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit: BPF prog-id=104 op=LOAD Apr 12 19:40:55.926000 audit: BPF prog-id=60 op=UNLOAD Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.926000 audit: BPF prog-id=105 op=LOAD Apr 12 19:40:55.926000 audit: BPF prog-id=68 op=UNLOAD Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit: BPF prog-id=106 op=LOAD Apr 12 19:40:55.928000 audit: BPF prog-id=61 op=UNLOAD Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit: BPF prog-id=107 op=LOAD Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:55.929000 audit: BPF prog-id=108 op=LOAD Apr 12 19:40:55.929000 audit: BPF prog-id=62 op=UNLOAD Apr 12 19:40:55.929000 audit: BPF prog-id=63 op=UNLOAD Apr 12 19:40:55.938322 kubelet[2927]: I0412 19:40:55.938299 2927 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:40:55.938373 systemd[1]: Stopping kubelet.service... Apr 12 19:40:55.952540 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 19:40:55.952746 systemd[1]: Stopped kubelet.service. Apr 12 19:40:55.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:55.952793 systemd[1]: kubelet.service: Consumed 1.533s CPU time. Apr 12 19:40:55.954442 systemd[1]: Started kubelet.service. Apr 12 19:40:55.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:55.987850 kubelet[3415]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:40:55.987850 kubelet[3415]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:40:55.987850 kubelet[3415]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:40:55.988066 kubelet[3415]: I0412 19:40:55.987871 3415 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:40:55.991719 kubelet[3415]: I0412 19:40:55.991702 3415 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:40:55.991719 kubelet[3415]: I0412 19:40:55.991719 3415 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:40:55.991881 kubelet[3415]: I0412 19:40:55.991873 3415 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:40:55.993313 kubelet[3415]: I0412 19:40:55.993303 3415 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 19:40:55.994980 kubelet[3415]: I0412 19:40:55.994961 3415 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:40:56.014421 kubelet[3415]: I0412 19:40:56.014399 3415 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:40:56.014589 kubelet[3415]: I0412 19:40:56.014580 3415 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:40:56.014740 kubelet[3415]: I0412 19:40:56.014729 3415 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:40:56.014812 kubelet[3415]: I0412 19:40:56.014748 3415 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:40:56.014812 kubelet[3415]: I0412 19:40:56.014758 3415 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:40:56.014812 kubelet[3415]: I0412 19:40:56.014784 3415 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:40:56.014872 kubelet[3415]: I0412 19:40:56.014865 3415 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:40:56.014892 kubelet[3415]: I0412 19:40:56.014879 3415 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:40:56.014912 kubelet[3415]: I0412 19:40:56.014901 3415 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:40:56.014935 kubelet[3415]: I0412 19:40:56.014913 3415 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:40:56.015492 kubelet[3415]: I0412 19:40:56.015470 3415 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:40:56.015671 kubelet[3415]: I0412 19:40:56.015663 3415 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:40:56.017232 kubelet[3415]: I0412 19:40:56.017216 3415 server.go:1256] "Started kubelet" Apr 12 19:40:56.017303 kubelet[3415]: I0412 19:40:56.017281 3415 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:40:56.017360 kubelet[3415]: I0412 19:40:56.017340 3415 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:40:56.017530 kubelet[3415]: I0412 19:40:56.017520 3415 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:40:56.017000 audit[3415]: AVC avc: denied { mac_admin } for pid=3415 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:56.017000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:40:56.017000 audit[3415]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001594ab0 a1=4000810510 a2=4001594a80 a3=25 items=0 ppid=1 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:56.017000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:40:56.017000 audit[3415]: AVC avc: denied { mac_admin } for pid=3415 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:56.017000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:40:56.017000 audit[3415]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000147440 a1=4000810528 a2=4001594b40 a3=25 items=0 ppid=1 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:56.017000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:40:56.018356 kubelet[3415]: I0412 19:40:56.018148 3415 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:40:56.018356 kubelet[3415]: I0412 19:40:56.018181 3415 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:40:56.018356 kubelet[3415]: I0412 19:40:56.018218 3415 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:40:56.018356 kubelet[3415]: I0412 19:40:56.018261 3415 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:40:56.018356 kubelet[3415]: E0412 19:40:56.018268 3415 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-f02954802e\" not found" Apr 12 19:40:56.018356 kubelet[3415]: I0412 19:40:56.018303 3415 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:40:56.018474 kubelet[3415]: I0412 19:40:56.018445 3415 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:40:56.018674 kubelet[3415]: I0412 19:40:56.018661 3415 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:40:56.018758 kubelet[3415]: E0412 19:40:56.018746 3415 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:40:56.018782 kubelet[3415]: I0412 19:40:56.018741 3415 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:40:56.019130 kubelet[3415]: I0412 19:40:56.019116 3415 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:40:56.019526 kubelet[3415]: I0412 19:40:56.019515 3415 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:40:56.024845 kubelet[3415]: I0412 19:40:56.024828 3415 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:40:56.025764 kubelet[3415]: I0412 19:40:56.025755 3415 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:40:56.025785 kubelet[3415]: I0412 19:40:56.025769 3415 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:40:56.025805 kubelet[3415]: I0412 19:40:56.025786 3415 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:40:56.025842 kubelet[3415]: E0412 19:40:56.025834 3415 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 19:40:56.046729 kubelet[3415]: I0412 19:40:56.046715 3415 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:40:56.046752 kubelet[3415]: I0412 19:40:56.046732 3415 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:40:56.046752 kubelet[3415]: I0412 19:40:56.046747 3415 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:40:56.046894 kubelet[3415]: I0412 19:40:56.046884 3415 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 19:40:56.046934 kubelet[3415]: I0412 19:40:56.046904 3415 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 19:40:56.046934 kubelet[3415]: I0412 19:40:56.046911 3415 policy_none.go:49] "None policy: Start" Apr 12 19:40:56.047310 kubelet[3415]: I0412 19:40:56.047295 3415 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:40:56.047332 kubelet[3415]: I0412 19:40:56.047323 3415 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:40:56.047481 kubelet[3415]: I0412 19:40:56.047472 3415 state_mem.go:75] "Updated machine memory state" Apr 12 19:40:56.050363 kubelet[3415]: I0412 19:40:56.050353 3415 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:40:56.050000 audit[3415]: AVC avc: denied { mac_admin } for pid=3415 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:40:56.050000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:40:56.050000 audit[3415]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40016d8420 a1=4001636f90 a2=40016d83f0 a3=25 items=0 ppid=1 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:40:56.050000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:40:56.050499 kubelet[3415]: I0412 19:40:56.050407 3415 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:40:56.050620 kubelet[3415]: I0412 19:40:56.050611 3415 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:40:56.121347 kubelet[3415]: I0412 19:40:56.121326 3415 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.125887 kubelet[3415]: I0412 19:40:56.125874 3415 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.125943 kubelet[3415]: I0412 19:40:56.125937 3415 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.126106 kubelet[3415]: I0412 19:40:56.126093 3415 topology_manager.go:215] "Topology Admit Handler" podUID="2f93c7819d583e7c7fb8939ef447aa3e" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.126170 kubelet[3415]: I0412 19:40:56.126162 3415 topology_manager.go:215] "Topology Admit Handler" podUID="1147ee14cd4f4adc377c7e572c495df7" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.126224 kubelet[3415]: I0412 19:40:56.126215 3415 topology_manager.go:215] "Topology Admit Handler" podUID="70a1cafcc9feec4a77e7e022bd12a146" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.129507 kubelet[3415]: W0412 19:40:56.129497 3415 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:56.129530 kubelet[3415]: W0412 19:40:56.129498 3415 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:56.129530 kubelet[3415]: W0412 19:40:56.129510 3415 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:56.129568 kubelet[3415]: E0412 19:40:56.129551 3415 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-f02954802e\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.129568 kubelet[3415]: E0412 19:40:56.129560 3415 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219158 kubelet[3415]: I0412 19:40:56.219136 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219220 kubelet[3415]: I0412 19:40:56.219169 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219220 kubelet[3415]: I0412 19:40:56.219190 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219312 kubelet[3415]: I0412 19:40:56.219251 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219357 kubelet[3415]: I0412 19:40:56.219309 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2f93c7819d583e7c7fb8939ef447aa3e-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-f02954802e\" (UID: \"2f93c7819d583e7c7fb8939ef447aa3e\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219357 kubelet[3415]: I0412 19:40:56.219343 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2f93c7819d583e7c7fb8939ef447aa3e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-f02954802e\" (UID: \"2f93c7819d583e7c7fb8939ef447aa3e\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219433 kubelet[3415]: I0412 19:40:56.219378 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1147ee14cd4f4adc377c7e572c495df7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" (UID: \"1147ee14cd4f4adc377c7e572c495df7\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219433 kubelet[3415]: I0412 19:40:56.219405 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/70a1cafcc9feec4a77e7e022bd12a146-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-f02954802e\" (UID: \"70a1cafcc9feec4a77e7e022bd12a146\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-f02954802e" Apr 12 19:40:56.219494 kubelet[3415]: I0412 19:40:56.219443 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2f93c7819d583e7c7fb8939ef447aa3e-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-f02954802e\" (UID: \"2f93c7819d583e7c7fb8939ef447aa3e\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:57.015581 kubelet[3415]: I0412 19:40:57.015532 3415 apiserver.go:52] "Watching apiserver" Apr 12 19:40:57.019313 kubelet[3415]: I0412 19:40:57.019288 3415 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:40:57.033771 kubelet[3415]: W0412 19:40:57.033754 3415 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:57.033857 kubelet[3415]: E0412 19:40:57.033801 3415 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.3-a-f02954802e\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" Apr 12 19:40:57.034019 kubelet[3415]: W0412 19:40:57.034007 3415 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 19:40:57.034061 kubelet[3415]: E0412 19:40:57.034050 3415 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-f02954802e\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" Apr 12 19:40:57.044948 kubelet[3415]: I0412 19:40:57.044928 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-f02954802e" podStartSLOduration=1.044890846 podStartE2EDuration="1.044890846s" podCreationTimestamp="2024-04-12 19:40:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:40:57.044858886 +0000 UTC m=+1.086690641" watchObservedRunningTime="2024-04-12 19:40:57.044890846 +0000 UTC m=+1.086722601" Apr 12 19:40:57.050242 kubelet[3415]: I0412 19:40:57.050223 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-f02954802e" podStartSLOduration=3.050190566 podStartE2EDuration="3.050190566s" podCreationTimestamp="2024-04-12 19:40:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:40:57.050145446 +0000 UTC m=+1.091977201" watchObservedRunningTime="2024-04-12 19:40:57.050190566 +0000 UTC m=+1.092022281" Apr 12 19:40:57.061011 kubelet[3415]: I0412 19:40:57.060980 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-f02954802e" podStartSLOduration=3.060948126 podStartE2EDuration="3.060948126s" podCreationTimestamp="2024-04-12 19:40:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:40:57.054785566 +0000 UTC m=+1.096617361" watchObservedRunningTime="2024-04-12 19:40:57.060948126 +0000 UTC m=+1.102779881" Apr 12 19:40:58.112851 update_engine[2115]: I0412 19:40:58.112807 2115 update_attempter.cc:509] Updating boot flags... Apr 12 19:40:59.155000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=526951 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 19:40:59.167641 kernel: kauditd_printk_skb: 266 callbacks suppressed Apr 12 19:40:59.167789 kernel: audit: type=1400 audit(1712950859.155:944): avc: denied { watch } for pid=3155 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=526951 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 19:40:59.155000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40008d55c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:40:59.278454 kernel: audit: type=1300 audit(1712950859.155:944): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40008d55c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:40:59.278492 kernel: audit: type=1327 audit(1712950859.155:944): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:40:59.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:40:59.607710 sudo[2278]: pam_unix(sudo:session): session closed for user root Apr 12 19:40:59.607000 audit[2278]: USER_END pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:59.607000 audit[2278]: CRED_DISP pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:59.681984 sshd[2275]: pam_unix(sshd:session): session closed for user core Apr 12 19:40:59.684183 systemd[1]: sshd@6-147.75.62.230:22-139.178.89.65:46312.service: Deactivated successfully. Apr 12 19:40:59.684920 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 19:40:59.685126 systemd[1]: session-9.scope: Consumed 6.242s CPU time. Apr 12 19:40:59.685443 systemd-logind[2114]: Session 9 logged out. Waiting for processes to exit. Apr 12 19:40:59.685938 systemd-logind[2114]: Removed session 9. Apr 12 19:40:59.692232 kernel: audit: type=1106 audit(1712950859.607:945): pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:59.692333 kernel: audit: type=1104 audit(1712950859.607:946): pid=2278 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:40:59.692381 kernel: audit: type=1106 audit(1712950859.682:947): pid=2275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:59.682000 audit[2275]: USER_END pid=2275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:59.682000 audit[2275]: CRED_DISP pid=2275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:59.790462 kernel: audit: type=1104 audit(1712950859.682:948): pid=2275 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:40:59.790523 kernel: audit: type=1131 audit(1712950859.684:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.62.230:22-139.178.89.65:46312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:40:59.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.62.230:22-139.178.89.65:46312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:41:11.232000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.232000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b50380 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.338091 kernel: audit: type=1400 audit(1712950871.232:950): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.338137 kernel: audit: type=1300 audit(1712950871.232:950): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b50380 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.232000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.380236 kubelet[3415]: I0412 19:41:11.380207 3415 topology_manager.go:215] "Topology Admit Handler" podUID="2e5c20f2-41f3-4161-8c70-f37adefaf515" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-7vh8b" Apr 12 19:41:11.384227 systemd[1]: Created slice kubepods-besteffort-pod2e5c20f2_41f3_4161_8c70_f37adefaf515.slice. Apr 12 19:41:11.391368 kernel: audit: type=1327 audit(1712950871.232:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.233000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.427773 kubelet[3415]: I0412 19:41:11.427752 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2e5c20f2-41f3-4161-8c70-f37adefaf515-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-7vh8b\" (UID: \"2e5c20f2-41f3-4161-8c70-f37adefaf515\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-7vh8b" Apr 12 19:41:11.427813 kubelet[3415]: I0412 19:41:11.427795 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nksr8\" (UniqueName: \"kubernetes.io/projected/2e5c20f2-41f3-4161-8c70-f37adefaf515-kube-api-access-nksr8\") pod \"tigera-operator-6bfc79cb9c-7vh8b\" (UID: \"2e5c20f2-41f3-4161-8c70-f37adefaf515\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-7vh8b" Apr 12 19:41:11.435946 kernel: audit: type=1400 audit(1712950871.233:951): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.233000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b503c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.494789 kernel: audit: type=1300 audit(1712950871.233:951): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b503c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.494819 kernel: audit: type=1327 audit(1712950871.233:951): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.522842 kubelet[3415]: I0412 19:41:11.522823 3415 topology_manager.go:215] "Topology Admit Handler" podUID="8db814e8-b568-4653-b09f-934d7954db82" podNamespace="kube-system" podName="kube-proxy-2f6k4" Apr 12 19:41:11.234000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.575416 kubelet[3415]: I0412 19:41:11.575401 3415 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 19:41:11.575692 env[2125]: time="2024-04-12T19:41:11.575667645Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 19:41:11.575880 kubelet[3415]: I0412 19:41:11.575808 3415 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 19:41:11.592472 kernel: audit: type=1400 audit(1712950871.234:952): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.234000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b50400 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.601643 systemd[1]: Created slice kubepods-besteffort-pod8db814e8_b568_4653_b09f_934d7954db82.slice. Apr 12 19:41:11.628981 kubelet[3415]: I0412 19:41:11.628964 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n48p6\" (UniqueName: \"kubernetes.io/projected/8db814e8-b568-4653-b09f-934d7954db82-kube-api-access-n48p6\") pod \"kube-proxy-2f6k4\" (UID: \"8db814e8-b568-4653-b09f-934d7954db82\") " pod="kube-system/kube-proxy-2f6k4" Apr 12 19:41:11.629013 kubelet[3415]: I0412 19:41:11.629001 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8db814e8-b568-4653-b09f-934d7954db82-lib-modules\") pod \"kube-proxy-2f6k4\" (UID: \"8db814e8-b568-4653-b09f-934d7954db82\") " pod="kube-system/kube-proxy-2f6k4" Apr 12 19:41:11.629079 kubelet[3415]: I0412 19:41:11.629062 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8db814e8-b568-4653-b09f-934d7954db82-kube-proxy\") pod \"kube-proxy-2f6k4\" (UID: \"8db814e8-b568-4653-b09f-934d7954db82\") " pod="kube-system/kube-proxy-2f6k4" Apr 12 19:41:11.629104 kubelet[3415]: I0412 19:41:11.629096 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8db814e8-b568-4653-b09f-934d7954db82-xtables-lock\") pod \"kube-proxy-2f6k4\" (UID: \"8db814e8-b568-4653-b09f-934d7954db82\") " pod="kube-system/kube-proxy-2f6k4" Apr 12 19:41:11.651442 kernel: audit: type=1300 audit(1712950871.234:952): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b50400 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.651484 kernel: audit: type=1327 audit(1712950871.234:952): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.652067 env[2125]: time="2024-04-12T19:41:11.652037498Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-7vh8b,Uid:2e5c20f2-41f3-4161-8c70-f37adefaf515,Namespace:tigera-operator,Attempt:0,}" Apr 12 19:41:11.234000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.749227 kernel: audit: type=1400 audit(1712950871.234:953): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:11.234000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001114020 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:11.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:11.755154 env[2125]: time="2024-04-12T19:41:11.755103851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:11.755154 env[2125]: time="2024-04-12T19:41:11.755138853Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:11.755154 env[2125]: time="2024-04-12T19:41:11.755150413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:11.755281 env[2125]: time="2024-04-12T19:41:11.755255537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd2e6d1304346fe3a558e183a9a804288f1bfd8d6bd457121db08d9c7fe0fa97 pid=3706 runtime=io.containerd.runc.v2 Apr 12 19:41:11.765155 systemd[1]: Started cri-containerd-bd2e6d1304346fe3a558e183a9a804288f1bfd8d6bd457121db08d9c7fe0fa97.scope. Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.776000 audit: BPF prog-id=109 op=LOAD Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3706 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326536643133303433343666653361353538653138336139613830 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3706 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326536643133303433343666653361353538653138336139613830 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit: BPF prog-id=110 op=LOAD Apr 12 19:41:11.777000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3706 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326536643133303433343666653361353538653138336139613830 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit: BPF prog-id=111 op=LOAD Apr 12 19:41:11.777000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3706 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326536643133303433343666653361353538653138336139613830 Apr 12 19:41:11.777000 audit: BPF prog-id=111 op=UNLOAD Apr 12 19:41:11.777000 audit: BPF prog-id=110 op=UNLOAD Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { perfmon } for pid=3715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit[3715]: AVC avc: denied { bpf } for pid=3715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.777000 audit: BPF prog-id=112 op=LOAD Apr 12 19:41:11.777000 audit[3715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3706 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326536643133303433343666653361353538653138336139613830 Apr 12 19:41:11.792589 env[2125]: time="2024-04-12T19:41:11.792550753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-7vh8b,Uid:2e5c20f2-41f3-4161-8c70-f37adefaf515,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"bd2e6d1304346fe3a558e183a9a804288f1bfd8d6bd457121db08d9c7fe0fa97\"" Apr 12 19:41:11.793820 env[2125]: time="2024-04-12T19:41:11.793800115Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 19:41:11.903618 env[2125]: time="2024-04-12T19:41:11.903589215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2f6k4,Uid:8db814e8-b568-4653-b09f-934d7954db82,Namespace:kube-system,Attempt:0,}" Apr 12 19:41:11.911120 env[2125]: time="2024-04-12T19:41:11.911063707Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:11.911120 env[2125]: time="2024-04-12T19:41:11.911101548Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:11.911120 env[2125]: time="2024-04-12T19:41:11.911111588Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:11.911247 env[2125]: time="2024-04-12T19:41:11.911218472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/62a009846e101b337536f3a7bb1c1f527407d3b6e4e96e28adc3a0f86016c896 pid=3748 runtime=io.containerd.runc.v2 Apr 12 19:41:11.920290 systemd[1]: Started cri-containerd-62a009846e101b337536f3a7bb1c1f527407d3b6e4e96e28adc3a0f86016c896.scope. Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit: BPF prog-id=113 op=LOAD Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3748 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613030393834366531303162333337353336663361376262316331 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3748 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613030393834366531303162333337353336663361376262316331 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit: BPF prog-id=114 op=LOAD Apr 12 19:41:11.932000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3748 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613030393834366531303162333337353336663361376262316331 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.932000 audit: BPF prog-id=115 op=LOAD Apr 12 19:41:11.932000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3748 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613030393834366531303162333337353336663361376262316331 Apr 12 19:41:11.933000 audit: BPF prog-id=115 op=UNLOAD Apr 12 19:41:11.933000 audit: BPF prog-id=114 op=UNLOAD Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { perfmon } for pid=3758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit[3758]: AVC avc: denied { bpf } for pid=3758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.933000 audit: BPF prog-id=116 op=LOAD Apr 12 19:41:11.933000 audit[3758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3748 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632613030393834366531303162333337353336663361376262316331 Apr 12 19:41:11.941526 env[2125]: time="2024-04-12T19:41:11.941493532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2f6k4,Uid:8db814e8-b568-4653-b09f-934d7954db82,Namespace:kube-system,Attempt:0,} returns sandbox id \"62a009846e101b337536f3a7bb1c1f527407d3b6e4e96e28adc3a0f86016c896\"" Apr 12 19:41:11.943387 env[2125]: time="2024-04-12T19:41:11.943363635Z" level=info msg="CreateContainer within sandbox \"62a009846e101b337536f3a7bb1c1f527407d3b6e4e96e28adc3a0f86016c896\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 19:41:11.949828 env[2125]: time="2024-04-12T19:41:11.949797852Z" level=info msg="CreateContainer within sandbox \"62a009846e101b337536f3a7bb1c1f527407d3b6e4e96e28adc3a0f86016c896\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"030a308db1c44eb1f7b71554b075aa27c59ddbfeebf60671617133227a0c4ff8\"" Apr 12 19:41:11.950174 env[2125]: time="2024-04-12T19:41:11.950152384Z" level=info msg="StartContainer for \"030a308db1c44eb1f7b71554b075aa27c59ddbfeebf60671617133227a0c4ff8\"" Apr 12 19:41:11.963064 systemd[1]: Started cri-containerd-030a308db1c44eb1f7b71554b075aa27c59ddbfeebf60671617133227a0c4ff8.scope. Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3748 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306133303864623163343465623166376237313535346230373561 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit: BPF prog-id=117 op=LOAD Apr 12 19:41:11.978000 audit[3789]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3748 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306133303864623163343465623166376237313535346230373561 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.978000 audit: BPF prog-id=118 op=LOAD Apr 12 19:41:11.978000 audit[3789]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3748 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306133303864623163343465623166376237313535346230373561 Apr 12 19:41:11.979000 audit: BPF prog-id=118 op=UNLOAD Apr 12 19:41:11.979000 audit: BPF prog-id=117 op=UNLOAD Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:11.979000 audit: BPF prog-id=119 op=LOAD Apr 12 19:41:11.979000 audit[3789]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3748 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:11.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306133303864623163343465623166376237313535346230373561 Apr 12 19:41:11.988885 env[2125]: time="2024-04-12T19:41:11.988850808Z" level=info msg="StartContainer for \"030a308db1c44eb1f7b71554b075aa27c59ddbfeebf60671617133227a0c4ff8\" returns successfully" Apr 12 19:41:12.056956 kubelet[3415]: I0412 19:41:12.056883 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2f6k4" podStartSLOduration=1.056842382 podStartE2EDuration="1.056842382s" podCreationTimestamp="2024-04-12 19:41:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:41:12.05677974 +0000 UTC m=+16.098611495" watchObservedRunningTime="2024-04-12 19:41:12.056842382 +0000 UTC m=+16.098674137" Apr 12 19:41:12.074000 audit[3858]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.074000 audit[3858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb41c070 a2=0 a3=1 items=0 ppid=3800 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:41:12.074000 audit[3857]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.074000 audit[3857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd80e4ee0 a2=0 a3=1 items=0 ppid=3800 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:41:12.074000 audit[3859]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=3859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.074000 audit[3859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff45562e0 a2=0 a3=1 items=0 ppid=3800 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:41:12.075000 audit[3860]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=3860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.075000 audit[3860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeef77ac0 a2=0 a3=1 items=0 ppid=3800 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:41:12.076000 audit[3863]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.076000 audit[3863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3f0c990 a2=0 a3=1 items=0 ppid=3800 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:41:12.076000 audit[3864]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.076000 audit[3864]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc928b6f0 a2=0 a3=1 items=0 ppid=3800 pid=3864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:41:12.176000 audit[3865]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.176000 audit[3865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe0d54dc0 a2=0 a3=1 items=0 ppid=3800 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:41:12.178000 audit[3867]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.178000 audit[3867]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcd234960 a2=0 a3=1 items=0 ppid=3800 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 19:41:12.181000 audit[3870]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.181000 audit[3870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd11e1590 a2=0 a3=1 items=0 ppid=3800 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 19:41:12.182000 audit[3871]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.182000 audit[3871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc13e1820 a2=0 a3=1 items=0 ppid=3800 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:41:12.184000 audit[3873]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.184000 audit[3873]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffca61b960 a2=0 a3=1 items=0 ppid=3800 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:41:12.185000 audit[3874]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.185000 audit[3874]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddca4d00 a2=0 a3=1 items=0 ppid=3800 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:41:12.187000 audit[3876]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.187000 audit[3876]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd93e9d10 a2=0 a3=1 items=0 ppid=3800 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:41:12.190000 audit[3879]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.190000 audit[3879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcfba4990 a2=0 a3=1 items=0 ppid=3800 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 19:41:12.191000 audit[3880]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.191000 audit[3880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd820e2e0 a2=0 a3=1 items=0 ppid=3800 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:41:12.193000 audit[3882]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3882 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.193000 audit[3882]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1f4a6b0 a2=0 a3=1 items=0 ppid=3800 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:41:12.194000 audit[3883]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.194000 audit[3883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee133fd0 a2=0 a3=1 items=0 ppid=3800 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:41:12.196000 audit[3885]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.196000 audit[3885]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeff46df0 a2=0 a3=1 items=0 ppid=3800 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:41:12.199000 audit[3888]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.199000 audit[3888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc21c840 a2=0 a3=1 items=0 ppid=3800 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:41:12.202000 audit[3891]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.202000 audit[3891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe00aa350 a2=0 a3=1 items=0 ppid=3800 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:41:12.203000 audit[3892]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.203000 audit[3892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff7ec8fd0 a2=0 a3=1 items=0 ppid=3800 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:41:12.205000 audit[3894]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.205000 audit[3894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffcd088130 a2=0 a3=1 items=0 ppid=3800 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:41:12.208000 audit[3897]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.208000 audit[3897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc0bf16d0 a2=0 a3=1 items=0 ppid=3800 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:41:12.209000 audit[3898]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.209000 audit[3898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd75a9160 a2=0 a3=1 items=0 ppid=3800 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:41:12.211000 audit[3900]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:41:12.211000 audit[3900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe17927e0 a2=0 a3=1 items=0 ppid=3800 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:41:12.230000 audit[3906]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:12.230000 audit[3906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffec01fec0 a2=0 a3=1 items=0 ppid=3800 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:12.247000 audit[3906]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:12.247000 audit[3906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffec01fec0 a2=0 a3=1 items=0 ppid=3800 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:12.248000 audit[3911]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.248000 audit[3911]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc8530640 a2=0 a3=1 items=0 ppid=3800 pid=3911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:41:12.250000 audit[3913]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.250000 audit[3913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff41038c0 a2=0 a3=1 items=0 ppid=3800 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 19:41:12.253000 audit[3916]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.253000 audit[3916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff1475bf0 a2=0 a3=1 items=0 ppid=3800 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 19:41:12.254000 audit[3917]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.254000 audit[3917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4d77e20 a2=0 a3=1 items=0 ppid=3800 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:41:12.256000 audit[3919]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.256000 audit[3919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffb68d520 a2=0 a3=1 items=0 ppid=3800 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:41:12.257000 audit[3920]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.257000 audit[3920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed0cf8b0 a2=0 a3=1 items=0 ppid=3800 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:41:12.259000 audit[3922]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.259000 audit[3922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffddeed4d0 a2=0 a3=1 items=0 ppid=3800 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 19:41:12.262000 audit[3925]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.262000 audit[3925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff871a320 a2=0 a3=1 items=0 ppid=3800 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:41:12.263000 audit[3926]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.263000 audit[3926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcaeb8a70 a2=0 a3=1 items=0 ppid=3800 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:41:12.265000 audit[3928]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.265000 audit[3928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9c26c70 a2=0 a3=1 items=0 ppid=3800 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:41:12.266000 audit[3929]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.266000 audit[3929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7f2c830 a2=0 a3=1 items=0 ppid=3800 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:41:12.268000 audit[3931]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.268000 audit[3931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf11f1a0 a2=0 a3=1 items=0 ppid=3800 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:41:12.271000 audit[3934]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.271000 audit[3934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff98c4990 a2=0 a3=1 items=0 ppid=3800 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:41:12.274000 audit[3937]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.274000 audit[3937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8ceb100 a2=0 a3=1 items=0 ppid=3800 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 19:41:12.275000 audit[3938]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.275000 audit[3938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff5c1a0c0 a2=0 a3=1 items=0 ppid=3800 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:41:12.277000 audit[3940]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.277000 audit[3940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd02eab70 a2=0 a3=1 items=0 ppid=3800 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:41:12.279000 audit[3943]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.279000 audit[3943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef12d4b0 a2=0 a3=1 items=0 ppid=3800 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:41:12.280000 audit[3944]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.280000 audit[3944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee1145c0 a2=0 a3=1 items=0 ppid=3800 pid=3944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:41:12.282000 audit[3946]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.282000 audit[3946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff398f7e0 a2=0 a3=1 items=0 ppid=3800 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:41:12.283000 audit[3947]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.283000 audit[3947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc7e6ce0 a2=0 a3=1 items=0 ppid=3800 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:41:12.285000 audit[3949]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.285000 audit[3949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff3ddc9f0 a2=0 a3=1 items=0 ppid=3800 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:41:12.288000 audit[3952]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:41:12.288000 audit[3952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcc2d1320 a2=0 a3=1 items=0 ppid=3800 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:41:12.290000 audit[3954]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:41:12.290000 audit[3954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffdffe5b00 a2=0 a3=1 items=0 ppid=3800 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.290000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:12.291000 audit[3954]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:41:12.291000 audit[3954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdffe5b00 a2=0 a3=1 items=0 ppid=3800 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.291000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:12.807150 env[2125]: time="2024-04-12T19:41:12.807114084Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:12.807981 env[2125]: time="2024-04-12T19:41:12.807957791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:12.809198 env[2125]: time="2024-04-12T19:41:12.809179350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:12.810461 env[2125]: time="2024-04-12T19:41:12.810441669Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:12.811121 env[2125]: time="2024-04-12T19:41:12.811102570Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 19:41:12.812507 env[2125]: time="2024-04-12T19:41:12.812486374Z" level=info msg="CreateContainer within sandbox \"bd2e6d1304346fe3a558e183a9a804288f1bfd8d6bd457121db08d9c7fe0fa97\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 19:41:12.817287 env[2125]: time="2024-04-12T19:41:12.817259365Z" level=info msg="CreateContainer within sandbox \"bd2e6d1304346fe3a558e183a9a804288f1bfd8d6bd457121db08d9c7fe0fa97\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"dd20bbcf34f0a5f2878e94afd42f46d1d55ff6c918f8e51f5331b423d7bbfdc3\"" Apr 12 19:41:12.817729 env[2125]: time="2024-04-12T19:41:12.817690658Z" level=info msg="StartContainer for \"dd20bbcf34f0a5f2878e94afd42f46d1d55ff6c918f8e51f5331b423d7bbfdc3\"" Apr 12 19:41:12.830630 systemd[1]: Started cri-containerd-dd20bbcf34f0a5f2878e94afd42f46d1d55ff6c918f8e51f5331b423d7bbfdc3.scope. Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit: BPF prog-id=120 op=LOAD Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3706 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464323062626366333466306135663238373865393461666434326634 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3706 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464323062626366333466306135663238373865393461666434326634 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.842000 audit: BPF prog-id=121 op=LOAD Apr 12 19:41:12.842000 audit[3962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3706 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464323062626366333466306135663238373865393461666434326634 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit: BPF prog-id=122 op=LOAD Apr 12 19:41:12.843000 audit[3962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3706 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464323062626366333466306135663238373865393461666434326634 Apr 12 19:41:12.843000 audit: BPF prog-id=122 op=UNLOAD Apr 12 19:41:12.843000 audit: BPF prog-id=121 op=UNLOAD Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { perfmon } for pid=3962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit[3962]: AVC avc: denied { bpf } for pid=3962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:12.843000 audit: BPF prog-id=123 op=LOAD Apr 12 19:41:12.843000 audit[3962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3706 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:12.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464323062626366333466306135663238373865393461666434326634 Apr 12 19:41:12.852623 env[2125]: time="2024-04-12T19:41:12.852585281Z" level=info msg="StartContainer for \"dd20bbcf34f0a5f2878e94afd42f46d1d55ff6c918f8e51f5331b423d7bbfdc3\" returns successfully" Apr 12 19:41:13.059888 kubelet[3415]: I0412 19:41:13.059809 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-7vh8b" podStartSLOduration=1.041912759 podStartE2EDuration="2.059767792s" podCreationTimestamp="2024-04-12 19:41:11 +0000 UTC" firstStartedPulling="2024-04-12 19:41:11.793455184 +0000 UTC m=+15.835286939" lastFinishedPulling="2024-04-12 19:41:12.811310217 +0000 UTC m=+16.853141972" observedRunningTime="2024-04-12 19:41:13.059638629 +0000 UTC m=+17.101470384" watchObservedRunningTime="2024-04-12 19:41:13.059767792 +0000 UTC m=+17.101599547" Apr 12 19:41:15.259000 audit[4039]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:15.259000 audit[4039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd0583f40 a2=0 a3=1 items=0 ppid=3800 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:15.259000 audit[4039]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:15.259000 audit[4039]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd0583f40 a2=0 a3=1 items=0 ppid=3800 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:15.270000 audit[4041]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=4041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:15.270000 audit[4041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdf921700 a2=0 a3=1 items=0 ppid=3800 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:15.273000 audit[4041]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=4041 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:15.273000 audit[4041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf921700 a2=0 a3=1 items=0 ppid=3800 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:15.374146 kubelet[3415]: I0412 19:41:15.374116 3415 topology_manager.go:215] "Topology Admit Handler" podUID="30f1e8c0-4add-464d-a65a-6af97c6e0955" podNamespace="calico-system" podName="calico-typha-c55694879-5hc77" Apr 12 19:41:15.379614 systemd[1]: Created slice kubepods-besteffort-pod30f1e8c0_4add_464d_a65a_6af97c6e0955.slice. Apr 12 19:41:15.396953 kubelet[3415]: I0412 19:41:15.396919 3415 topology_manager.go:215] "Topology Admit Handler" podUID="115821ad-5979-4ae0-bd13-9e8a51e52552" podNamespace="calico-system" podName="calico-node-p6rp8" Apr 12 19:41:15.401243 systemd[1]: Created slice kubepods-besteffort-pod115821ad_5979_4ae0_bd13_9e8a51e52552.slice. Apr 12 19:41:15.452446 kubelet[3415]: I0412 19:41:15.452415 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-flexvol-driver-host\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452446 kubelet[3415]: I0412 19:41:15.452451 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-var-lib-calico\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452616 kubelet[3415]: I0412 19:41:15.452472 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-xtables-lock\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452616 kubelet[3415]: I0412 19:41:15.452562 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-cni-log-dir\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452692 kubelet[3415]: I0412 19:41:15.452617 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/30f1e8c0-4add-464d-a65a-6af97c6e0955-tigera-ca-bundle\") pod \"calico-typha-c55694879-5hc77\" (UID: \"30f1e8c0-4add-464d-a65a-6af97c6e0955\") " pod="calico-system/calico-typha-c55694879-5hc77" Apr 12 19:41:15.452692 kubelet[3415]: I0412 19:41:15.452666 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-lib-modules\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452733 kubelet[3415]: I0412 19:41:15.452718 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5q2bk\" (UniqueName: \"kubernetes.io/projected/115821ad-5979-4ae0-bd13-9e8a51e52552-kube-api-access-5q2bk\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452758 kubelet[3415]: I0412 19:41:15.452752 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/115821ad-5979-4ae0-bd13-9e8a51e52552-tigera-ca-bundle\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452782 kubelet[3415]: I0412 19:41:15.452774 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rwcp4\" (UniqueName: \"kubernetes.io/projected/30f1e8c0-4add-464d-a65a-6af97c6e0955-kube-api-access-rwcp4\") pod \"calico-typha-c55694879-5hc77\" (UID: \"30f1e8c0-4add-464d-a65a-6af97c6e0955\") " pod="calico-system/calico-typha-c55694879-5hc77" Apr 12 19:41:15.452812 kubelet[3415]: I0412 19:41:15.452803 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-var-run-calico\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452861 kubelet[3415]: I0412 19:41:15.452853 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-cni-net-dir\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452944 kubelet[3415]: I0412 19:41:15.452919 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-policysync\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.452991 kubelet[3415]: I0412 19:41:15.452978 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/115821ad-5979-4ae0-bd13-9e8a51e52552-cni-bin-dir\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.453037 kubelet[3415]: I0412 19:41:15.453029 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/30f1e8c0-4add-464d-a65a-6af97c6e0955-typha-certs\") pod \"calico-typha-c55694879-5hc77\" (UID: \"30f1e8c0-4add-464d-a65a-6af97c6e0955\") " pod="calico-system/calico-typha-c55694879-5hc77" Apr 12 19:41:15.453100 kubelet[3415]: I0412 19:41:15.453092 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/115821ad-5979-4ae0-bd13-9e8a51e52552-node-certs\") pod \"calico-node-p6rp8\" (UID: \"115821ad-5979-4ae0-bd13-9e8a51e52552\") " pod="calico-system/calico-node-p6rp8" Apr 12 19:41:15.502838 kubelet[3415]: I0412 19:41:15.502817 3415 topology_manager.go:215] "Topology Admit Handler" podUID="23068c8c-d1e2-4ddd-beb1-96fdc90a60a7" podNamespace="calico-system" podName="csi-node-driver-srgsc" Apr 12 19:41:15.503061 kubelet[3415]: E0412 19:41:15.503047 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-srgsc" podUID="23068c8c-d1e2-4ddd-beb1-96fdc90a60a7" Apr 12 19:41:15.553451 kubelet[3415]: I0412 19:41:15.553366 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wfzsv\" (UniqueName: \"kubernetes.io/projected/23068c8c-d1e2-4ddd-beb1-96fdc90a60a7-kube-api-access-wfzsv\") pod \"csi-node-driver-srgsc\" (UID: \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\") " pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:15.553543 kubelet[3415]: I0412 19:41:15.553477 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/23068c8c-d1e2-4ddd-beb1-96fdc90a60a7-kubelet-dir\") pod \"csi-node-driver-srgsc\" (UID: \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\") " pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:15.553543 kubelet[3415]: I0412 19:41:15.553540 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/23068c8c-d1e2-4ddd-beb1-96fdc90a60a7-socket-dir\") pod \"csi-node-driver-srgsc\" (UID: \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\") " pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:15.553599 kubelet[3415]: I0412 19:41:15.553591 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/23068c8c-d1e2-4ddd-beb1-96fdc90a60a7-varrun\") pod \"csi-node-driver-srgsc\" (UID: \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\") " pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:15.553798 kubelet[3415]: I0412 19:41:15.553788 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/23068c8c-d1e2-4ddd-beb1-96fdc90a60a7-registration-dir\") pod \"csi-node-driver-srgsc\" (UID: \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\") " pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:15.554378 kubelet[3415]: E0412 19:41:15.554362 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.554404 kubelet[3415]: W0412 19:41:15.554380 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.554426 kubelet[3415]: E0412 19:41:15.554411 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.554626 kubelet[3415]: E0412 19:41:15.554617 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.554653 kubelet[3415]: W0412 19:41:15.554627 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.554653 kubelet[3415]: E0412 19:41:15.554638 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.556700 kubelet[3415]: E0412 19:41:15.556687 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.556726 kubelet[3415]: W0412 19:41:15.556702 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.556726 kubelet[3415]: E0412 19:41:15.556722 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.556946 kubelet[3415]: E0412 19:41:15.556938 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.556970 kubelet[3415]: W0412 19:41:15.556946 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.556970 kubelet[3415]: E0412 19:41:15.556961 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.562523 kubelet[3415]: E0412 19:41:15.562510 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.562559 kubelet[3415]: W0412 19:41:15.562523 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.562559 kubelet[3415]: E0412 19:41:15.562542 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.562751 kubelet[3415]: E0412 19:41:15.562741 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.562782 kubelet[3415]: W0412 19:41:15.562751 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.562782 kubelet[3415]: E0412 19:41:15.562762 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.654685 kubelet[3415]: E0412 19:41:15.654649 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.654685 kubelet[3415]: W0412 19:41:15.654665 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.654685 kubelet[3415]: E0412 19:41:15.654682 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.654960 kubelet[3415]: E0412 19:41:15.654885 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.654960 kubelet[3415]: W0412 19:41:15.654892 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.654960 kubelet[3415]: E0412 19:41:15.654902 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.655072 kubelet[3415]: E0412 19:41:15.655066 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.655128 kubelet[3415]: W0412 19:41:15.655076 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.655128 kubelet[3415]: E0412 19:41:15.655086 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.655331 kubelet[3415]: E0412 19:41:15.655318 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.655331 kubelet[3415]: W0412 19:41:15.655326 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.655380 kubelet[3415]: E0412 19:41:15.655337 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.655505 kubelet[3415]: E0412 19:41:15.655495 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.655505 kubelet[3415]: W0412 19:41:15.655503 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.655557 kubelet[3415]: E0412 19:41:15.655513 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.655731 kubelet[3415]: E0412 19:41:15.655713 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.655769 kubelet[3415]: W0412 19:41:15.655730 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.655769 kubelet[3415]: E0412 19:41:15.655750 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.655904 kubelet[3415]: E0412 19:41:15.655893 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.655904 kubelet[3415]: W0412 19:41:15.655902 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.655955 kubelet[3415]: E0412 19:41:15.655915 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.656508 kubelet[3415]: E0412 19:41:15.656075 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.656508 kubelet[3415]: W0412 19:41:15.656083 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.656508 kubelet[3415]: E0412 19:41:15.656095 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.656508 kubelet[3415]: E0412 19:41:15.656354 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.656508 kubelet[3415]: W0412 19:41:15.656361 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.656508 kubelet[3415]: E0412 19:41:15.656373 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.656508 kubelet[3415]: E0412 19:41:15.656509 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.656508 kubelet[3415]: W0412 19:41:15.656516 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.656718 kubelet[3415]: E0412 19:41:15.656529 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.656754 kubelet[3415]: E0412 19:41:15.656740 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.656777 kubelet[3415]: W0412 19:41:15.656753 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.656777 kubelet[3415]: E0412 19:41:15.656771 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.657007 kubelet[3415]: E0412 19:41:15.656999 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.657031 kubelet[3415]: W0412 19:41:15.657007 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.657053 kubelet[3415]: E0412 19:41:15.657027 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.657183 kubelet[3415]: E0412 19:41:15.657176 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.657205 kubelet[3415]: W0412 19:41:15.657183 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.657205 kubelet[3415]: E0412 19:41:15.657200 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.657391 kubelet[3415]: E0412 19:41:15.657384 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.657414 kubelet[3415]: W0412 19:41:15.657391 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.657414 kubelet[3415]: E0412 19:41:15.657412 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.657521 kubelet[3415]: E0412 19:41:15.657514 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.657544 kubelet[3415]: W0412 19:41:15.657521 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.657544 kubelet[3415]: E0412 19:41:15.657534 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.657722 kubelet[3415]: E0412 19:41:15.657715 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.657743 kubelet[3415]: W0412 19:41:15.657722 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.657743 kubelet[3415]: E0412 19:41:15.657734 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.657936 kubelet[3415]: E0412 19:41:15.657929 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.657958 kubelet[3415]: W0412 19:41:15.657936 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.657958 kubelet[3415]: E0412 19:41:15.657948 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.658171 kubelet[3415]: E0412 19:41:15.658164 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.658192 kubelet[3415]: W0412 19:41:15.658171 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.658192 kubelet[3415]: E0412 19:41:15.658184 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.658379 kubelet[3415]: E0412 19:41:15.658369 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.658401 kubelet[3415]: W0412 19:41:15.658380 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.658401 kubelet[3415]: E0412 19:41:15.658396 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.658585 kubelet[3415]: E0412 19:41:15.658578 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.658607 kubelet[3415]: W0412 19:41:15.658585 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.658607 kubelet[3415]: E0412 19:41:15.658602 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.658770 kubelet[3415]: E0412 19:41:15.658762 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.658791 kubelet[3415]: W0412 19:41:15.658770 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.658791 kubelet[3415]: E0412 19:41:15.658787 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.658939 kubelet[3415]: E0412 19:41:15.658930 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.658973 kubelet[3415]: W0412 19:41:15.658946 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.658973 kubelet[3415]: E0412 19:41:15.658959 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.659138 kubelet[3415]: E0412 19:41:15.659130 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.659138 kubelet[3415]: W0412 19:41:15.659137 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.659178 kubelet[3415]: E0412 19:41:15.659149 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.659279 kubelet[3415]: E0412 19:41:15.659272 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.659304 kubelet[3415]: W0412 19:41:15.659280 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.659304 kubelet[3415]: E0412 19:41:15.659293 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.659581 kubelet[3415]: E0412 19:41:15.659572 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.659603 kubelet[3415]: W0412 19:41:15.659581 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.659603 kubelet[3415]: E0412 19:41:15.659592 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.667171 kubelet[3415]: E0412 19:41:15.667154 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:15.667196 kubelet[3415]: W0412 19:41:15.667172 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:15.667196 kubelet[3415]: E0412 19:41:15.667190 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:15.681761 env[2125]: time="2024-04-12T19:41:15.681732556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-c55694879-5hc77,Uid:30f1e8c0-4add-464d-a65a-6af97c6e0955,Namespace:calico-system,Attempt:0,}" Apr 12 19:41:15.690303 env[2125]: time="2024-04-12T19:41:15.690246737Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:15.690303 env[2125]: time="2024-04-12T19:41:15.690283898Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:15.690349 env[2125]: time="2024-04-12T19:41:15.690299939Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:15.690427 env[2125]: time="2024-04-12T19:41:15.690405582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8b1951b4de61d5b51cbb2e4e66bc032f25066dce2c543c6d58b29f616a3e16f pid=4087 runtime=io.containerd.runc.v2 Apr 12 19:41:15.699665 systemd[1]: Started cri-containerd-b8b1951b4de61d5b51cbb2e4e66bc032f25066dce2c543c6d58b29f616a3e16f.scope. Apr 12 19:41:15.703905 env[2125]: time="2024-04-12T19:41:15.703878452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p6rp8,Uid:115821ad-5979-4ae0-bd13-9e8a51e52552,Namespace:calico-system,Attempt:0,}" Apr 12 19:41:15.711153 env[2125]: time="2024-04-12T19:41:15.711104560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:15.711153 env[2125]: time="2024-04-12T19:41:15.711143001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:15.711234 env[2125]: time="2024-04-12T19:41:15.711153202Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:15.711273 env[2125]: time="2024-04-12T19:41:15.711255044Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05 pid=4123 runtime=io.containerd.runc.v2 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit: BPF prog-id=124 op=LOAD Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4087 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623139353162346465363164356235316362623265346536366263 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4087 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623139353162346465363164356235316362623265346536366263 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit: BPF prog-id=125 op=LOAD Apr 12 19:41:15.712000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4087 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623139353162346465363164356235316362623265346536366263 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit: BPF prog-id=126 op=LOAD Apr 12 19:41:15.712000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4087 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623139353162346465363164356235316362623265346536366263 Apr 12 19:41:15.712000 audit: BPF prog-id=126 op=UNLOAD Apr 12 19:41:15.712000 audit: BPF prog-id=125 op=UNLOAD Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.712000 audit: BPF prog-id=127 op=LOAD Apr 12 19:41:15.712000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4087 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238623139353162346465363164356235316362623265346536366263 Apr 12 19:41:15.719719 systemd[1]: Started cri-containerd-a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05.scope. Apr 12 19:41:15.728726 env[2125]: time="2024-04-12T19:41:15.728689778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-c55694879-5hc77,Uid:30f1e8c0-4add-464d-a65a-6af97c6e0955,Namespace:calico-system,Attempt:0,} returns sandbox id \"b8b1951b4de61d5b51cbb2e4e66bc032f25066dce2c543c6d58b29f616a3e16f\"" Apr 12 19:41:15.729784 env[2125]: time="2024-04-12T19:41:15.729761926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit: BPF prog-id=128 op=LOAD Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4123 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613236393932623765396439633765323863386630356161383931 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4123 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613236393932623765396439633765323863386630356161383931 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.732000 audit: BPF prog-id=129 op=LOAD Apr 12 19:41:15.732000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4123 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613236393932623765396439633765323863386630356161383931 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit: BPF prog-id=130 op=LOAD Apr 12 19:41:15.733000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4123 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613236393932623765396439633765323863386630356161383931 Apr 12 19:41:15.733000 audit: BPF prog-id=130 op=UNLOAD Apr 12 19:41:15.733000 audit: BPF prog-id=129 op=UNLOAD Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:15.733000 audit: BPF prog-id=131 op=LOAD Apr 12 19:41:15.733000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4123 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:15.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613236393932623765396439633765323863386630356161383931 Apr 12 19:41:15.741850 env[2125]: time="2024-04-12T19:41:15.741823480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p6rp8,Uid:115821ad-5979-4ae0-bd13-9e8a51e52552,Namespace:calico-system,Attempt:0,} returns sandbox id \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\"" Apr 12 19:41:16.284000 audit[4171]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:16.297942 kernel: kauditd_printk_skb: 495 callbacks suppressed Apr 12 19:41:16.297972 kernel: audit: type=1325 audit(1712950876.284:1105): table=filter:93 family=2 entries=16 op=nft_register_rule pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:16.284000 audit[4171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffeea7c8a0 a2=0 a3=1 items=0 ppid=3800 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.383341 kernel: audit: type=1300 audit(1712950876.284:1105): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffeea7c8a0 a2=0 a3=1 items=0 ppid=3800 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:16.411124 kernel: audit: type=1327 audit(1712950876.284:1105): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:16.417000 audit[4171]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:16.417000 audit[4171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeea7c8a0 a2=0 a3=1 items=0 ppid=3800 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.503665 kernel: audit: type=1325 audit(1712950876.417:1106): table=nat:94 family=2 entries=12 op=nft_register_rule pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:16.503694 kernel: audit: type=1300 audit(1712950876.417:1106): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeea7c8a0 a2=0 a3=1 items=0 ppid=3800 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:16.531449 kernel: audit: type=1327 audit(1712950876.417:1106): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:16.593475 env[2125]: time="2024-04-12T19:41:16.593405724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:16.594069 env[2125]: time="2024-04-12T19:41:16.594045340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:16.595159 env[2125]: time="2024-04-12T19:41:16.595141686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:16.596153 env[2125]: time="2024-04-12T19:41:16.596133590Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:16.596676 env[2125]: time="2024-04-12T19:41:16.596656923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 19:41:16.597112 env[2125]: time="2024-04-12T19:41:16.597094654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 19:41:16.602411 env[2125]: time="2024-04-12T19:41:16.602388263Z" level=info msg="CreateContainer within sandbox \"b8b1951b4de61d5b51cbb2e4e66bc032f25066dce2c543c6d58b29f616a3e16f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 19:41:16.609483 env[2125]: time="2024-04-12T19:41:16.609456236Z" level=info msg="CreateContainer within sandbox \"b8b1951b4de61d5b51cbb2e4e66bc032f25066dce2c543c6d58b29f616a3e16f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8858d08801de40cc9b05b3f2289485b73cacaf12662cd878646b177970752892\"" Apr 12 19:41:16.609802 env[2125]: time="2024-04-12T19:41:16.609779283Z" level=info msg="StartContainer for \"8858d08801de40cc9b05b3f2289485b73cacaf12662cd878646b177970752892\"" Apr 12 19:41:16.623073 systemd[1]: Started cri-containerd-8858d08801de40cc9b05b3f2289485b73cacaf12662cd878646b177970752892.scope. Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.715436 kernel: audit: type=1400 audit(1712950876.636:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.715765 kernel: audit: type=1400 audit(1712950876.636:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.715819 kernel: audit: type=1400 audit(1712950876.636:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.793089 kernel: audit: type=1400 audit(1712950876.636:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit: BPF prog-id=132 op=LOAD Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4087 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353864303838303164653430636339623035623366323238393438 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4087 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353864303838303164653430636339623035623366323238393438 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.675000 audit: BPF prog-id=133 op=LOAD Apr 12 19:41:16.675000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4087 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353864303838303164653430636339623035623366323238393438 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.714000 audit: BPF prog-id=134 op=LOAD Apr 12 19:41:16.714000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4087 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353864303838303164653430636339623035623366323238393438 Apr 12 19:41:16.752000 audit: BPF prog-id=134 op=UNLOAD Apr 12 19:41:16.752000 audit: BPF prog-id=133 op=UNLOAD Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:16.752000 audit: BPF prog-id=135 op=LOAD Apr 12 19:41:16.752000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4087 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:16.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838353864303838303164653430636339623035623366323238393438 Apr 12 19:41:16.807022 env[2125]: time="2024-04-12T19:41:16.806992976Z" level=info msg="StartContainer for \"8858d08801de40cc9b05b3f2289485b73cacaf12662cd878646b177970752892\" returns successfully" Apr 12 19:41:17.026222 kubelet[3415]: E0412 19:41:17.026188 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-srgsc" podUID="23068c8c-d1e2-4ddd-beb1-96fdc90a60a7" Apr 12 19:41:17.033011 env[2125]: time="2024-04-12T19:41:17.032979403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:17.033649 env[2125]: time="2024-04-12T19:41:17.033629378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:17.034573 env[2125]: time="2024-04-12T19:41:17.034555679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:17.035526 env[2125]: time="2024-04-12T19:41:17.035504261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:17.035957 env[2125]: time="2024-04-12T19:41:17.035933750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 19:41:17.037197 env[2125]: time="2024-04-12T19:41:17.037177659Z" level=info msg="CreateContainer within sandbox \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:41:17.042920 env[2125]: time="2024-04-12T19:41:17.042896150Z" level=info msg="CreateContainer within sandbox \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae\"" Apr 12 19:41:17.043232 env[2125]: time="2024-04-12T19:41:17.043210477Z" level=info msg="StartContainer for \"11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae\"" Apr 12 19:41:17.060721 kubelet[3415]: E0412 19:41:17.060706 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.060751 kubelet[3415]: W0412 19:41:17.060722 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.060751 kubelet[3415]: E0412 19:41:17.060739 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.060979 kubelet[3415]: E0412 19:41:17.060972 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061005 kubelet[3415]: W0412 19:41:17.060980 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061005 kubelet[3415]: E0412 19:41:17.060990 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.061176 kubelet[3415]: E0412 19:41:17.061169 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061201 kubelet[3415]: W0412 19:41:17.061176 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061201 kubelet[3415]: E0412 19:41:17.061185 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.061370 kubelet[3415]: E0412 19:41:17.061362 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061395 kubelet[3415]: W0412 19:41:17.061370 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061395 kubelet[3415]: E0412 19:41:17.061379 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.061511 kubelet[3415]: E0412 19:41:17.061503 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061532 kubelet[3415]: W0412 19:41:17.061514 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061532 kubelet[3415]: E0412 19:41:17.061524 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.061645 kubelet[3415]: E0412 19:41:17.061638 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061673 kubelet[3415]: W0412 19:41:17.061645 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061673 kubelet[3415]: E0412 19:41:17.061655 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.061776 kubelet[3415]: E0412 19:41:17.061769 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061798 kubelet[3415]: W0412 19:41:17.061776 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061798 kubelet[3415]: E0412 19:41:17.061785 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.061956 kubelet[3415]: E0412 19:41:17.061949 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.061980 kubelet[3415]: W0412 19:41:17.061956 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.061980 kubelet[3415]: E0412 19:41:17.061965 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.062139 kubelet[3415]: E0412 19:41:17.062131 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.062162 kubelet[3415]: W0412 19:41:17.062139 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.062162 kubelet[3415]: E0412 19:41:17.062148 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.062330 kubelet[3415]: E0412 19:41:17.062323 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.062355 kubelet[3415]: W0412 19:41:17.062330 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.062355 kubelet[3415]: E0412 19:41:17.062340 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.062458 kubelet[3415]: E0412 19:41:17.062451 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.062483 kubelet[3415]: W0412 19:41:17.062458 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.062483 kubelet[3415]: E0412 19:41:17.062469 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.062639 kubelet[3415]: E0412 19:41:17.062632 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.062662 kubelet[3415]: W0412 19:41:17.062639 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.062662 kubelet[3415]: E0412 19:41:17.062647 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.062831 kubelet[3415]: E0412 19:41:17.062821 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.062831 kubelet[3415]: W0412 19:41:17.062829 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.062885 kubelet[3415]: E0412 19:41:17.062838 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.063017 kubelet[3415]: E0412 19:41:17.063009 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.063041 kubelet[3415]: W0412 19:41:17.063017 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.063041 kubelet[3415]: E0412 19:41:17.063026 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.063222 kubelet[3415]: E0412 19:41:17.063215 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.063248 kubelet[3415]: W0412 19:41:17.063222 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.063248 kubelet[3415]: E0412 19:41:17.063233 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.063482 kubelet[3415]: E0412 19:41:17.063473 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.063512 kubelet[3415]: W0412 19:41:17.063482 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.063512 kubelet[3415]: E0412 19:41:17.063496 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.063662 kubelet[3415]: E0412 19:41:17.063653 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.063683 kubelet[3415]: W0412 19:41:17.063662 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.063683 kubelet[3415]: E0412 19:41:17.063675 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.063739 systemd[1]: Started cri-containerd-11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae.scope. Apr 12 19:41:17.063886 kubelet[3415]: E0412 19:41:17.063848 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.063886 kubelet[3415]: W0412 19:41:17.063861 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.063886 kubelet[3415]: E0412 19:41:17.063878 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.064074 kubelet[3415]: E0412 19:41:17.064065 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.064074 kubelet[3415]: W0412 19:41:17.064074 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.064133 kubelet[3415]: E0412 19:41:17.064086 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.064317 kubelet[3415]: E0412 19:41:17.064303 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.064347 kubelet[3415]: W0412 19:41:17.064318 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.064347 kubelet[3415]: E0412 19:41:17.064336 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.064528 kubelet[3415]: E0412 19:41:17.064520 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.064553 kubelet[3415]: W0412 19:41:17.064529 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.064553 kubelet[3415]: E0412 19:41:17.064545 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.064686 kubelet[3415]: E0412 19:41:17.064678 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.064713 kubelet[3415]: W0412 19:41:17.064686 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.064713 kubelet[3415]: E0412 19:41:17.064699 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.064822 kubelet[3415]: E0412 19:41:17.064814 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.064846 kubelet[3415]: W0412 19:41:17.064822 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.064871 kubelet[3415]: E0412 19:41:17.064846 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.065004 kubelet[3415]: E0412 19:41:17.064997 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.065028 kubelet[3415]: W0412 19:41:17.065004 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.065028 kubelet[3415]: E0412 19:41:17.065022 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.065138 kubelet[3415]: E0412 19:41:17.065131 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.065160 kubelet[3415]: W0412 19:41:17.065138 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.065160 kubelet[3415]: E0412 19:41:17.065152 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.065378 kubelet[3415]: E0412 19:41:17.065371 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.065400 kubelet[3415]: W0412 19:41:17.065378 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.065400 kubelet[3415]: E0412 19:41:17.065391 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.065679 kubelet[3415]: E0412 19:41:17.065667 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.065701 kubelet[3415]: W0412 19:41:17.065680 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.065701 kubelet[3415]: E0412 19:41:17.065696 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.065953 kubelet[3415]: E0412 19:41:17.065943 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.065975 kubelet[3415]: W0412 19:41:17.065953 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.065975 kubelet[3415]: E0412 19:41:17.065968 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.066146 kubelet[3415]: E0412 19:41:17.066139 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.066168 kubelet[3415]: W0412 19:41:17.066147 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.066168 kubelet[3415]: E0412 19:41:17.066159 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.066381 kubelet[3415]: E0412 19:41:17.066373 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.066409 kubelet[3415]: W0412 19:41:17.066383 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.066409 kubelet[3415]: E0412 19:41:17.066397 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.066629 kubelet[3415]: E0412 19:41:17.066618 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.066655 kubelet[3415]: W0412 19:41:17.066630 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.066655 kubelet[3415]: E0412 19:41:17.066648 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.066805 kubelet[3415]: E0412 19:41:17.066797 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.066830 kubelet[3415]: W0412 19:41:17.066806 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.066830 kubelet[3415]: E0412 19:41:17.066818 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.066962 kubelet[3415]: E0412 19:41:17.066954 3415 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:41:17.066984 kubelet[3415]: W0412 19:41:17.066962 3415 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:41:17.066984 kubelet[3415]: E0412 19:41:17.066971 3415 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:41:17.066984 kubelet[3415]: I0412 19:41:17.066973 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-c55694879-5hc77" podStartSLOduration=1.199581411 podStartE2EDuration="2.06693662s" podCreationTimestamp="2024-04-12 19:41:15 +0000 UTC" firstStartedPulling="2024-04-12 19:41:15.72953328 +0000 UTC m=+19.771365035" lastFinishedPulling="2024-04-12 19:41:16.596888489 +0000 UTC m=+20.638720244" observedRunningTime="2024-04-12 19:41:17.066539571 +0000 UTC m=+21.108371326" watchObservedRunningTime="2024-04-12 19:41:17.06693662 +0000 UTC m=+21.108768335" Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4123 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:17.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636139346433663531313062383832396661306139316561386339 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit: BPF prog-id=136 op=LOAD Apr 12 19:41:17.078000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4123 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:17.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636139346433663531313062383832396661306139316561386339 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit: BPF prog-id=137 op=LOAD Apr 12 19:41:17.078000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4123 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:17.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636139346433663531313062383832396661306139316561386339 Apr 12 19:41:17.078000 audit: BPF prog-id=137 op=UNLOAD Apr 12 19:41:17.078000 audit: BPF prog-id=136 op=UNLOAD Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:17.078000 audit: BPF prog-id=138 op=LOAD Apr 12 19:41:17.078000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4123 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:17.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131636139346433663531313062383832396661306139316561386339 Apr 12 19:41:17.088417 env[2125]: time="2024-04-12T19:41:17.088388511Z" level=info msg="StartContainer for \"11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae\" returns successfully" Apr 12 19:41:17.095846 systemd[1]: cri-containerd-11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae.scope: Deactivated successfully. Apr 12 19:41:17.106000 audit: BPF prog-id=138 op=UNLOAD Apr 12 19:41:17.228555 env[2125]: time="2024-04-12T19:41:17.228508316Z" level=info msg="shim disconnected" id=11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae Apr 12 19:41:17.228555 env[2125]: time="2024-04-12T19:41:17.228548157Z" level=warning msg="cleaning up after shim disconnected" id=11ca94d3f5110b8829fa0a91ea8c93a4073f32a2173697ea1bb736b453e02dae namespace=k8s.io Apr 12 19:41:17.228555 env[2125]: time="2024-04-12T19:41:17.228557557Z" level=info msg="cleaning up dead shim" Apr 12 19:41:17.234450 env[2125]: time="2024-04-12T19:41:17.234423532Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:41:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4317 runtime=io.containerd.runc.v2\n" Apr 12 19:41:17.922000 audit[4332]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=4332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:17.922000 audit[4332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffdd854810 a2=0 a3=1 items=0 ppid=3800 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:17.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:17.932000 audit[4332]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=4332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:17.932000 audit[4332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffdd854810 a2=0 a3=1 items=0 ppid=3800 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:17.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:18.061945 env[2125]: time="2024-04-12T19:41:18.061913737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 19:41:18.282635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3647489449.mount: Deactivated successfully. Apr 12 19:41:19.026449 kubelet[3415]: E0412 19:41:19.026412 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-srgsc" podUID="23068c8c-d1e2-4ddd-beb1-96fdc90a60a7" Apr 12 19:41:20.189960 env[2125]: time="2024-04-12T19:41:20.189922949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:20.190634 env[2125]: time="2024-04-12T19:41:20.190612722Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:20.191816 env[2125]: time="2024-04-12T19:41:20.191797665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:20.192782 env[2125]: time="2024-04-12T19:41:20.192763643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:20.193254 env[2125]: time="2024-04-12T19:41:20.193232372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 19:41:20.194703 env[2125]: time="2024-04-12T19:41:20.194678439Z" level=info msg="CreateContainer within sandbox \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 19:41:20.200530 env[2125]: time="2024-04-12T19:41:20.200504709Z" level=info msg="CreateContainer within sandbox \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad\"" Apr 12 19:41:20.200883 env[2125]: time="2024-04-12T19:41:20.200860555Z" level=info msg="StartContainer for \"7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad\"" Apr 12 19:41:20.216270 systemd[1]: Started cri-containerd-7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad.scope. Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4123 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:20.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616133636432343535303234333734393063313838356638303939 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit: BPF prog-id=139 op=LOAD Apr 12 19:41:20.229000 audit[4350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4123 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:20.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616133636432343535303234333734393063313838356638303939 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit: BPF prog-id=140 op=LOAD Apr 12 19:41:20.229000 audit[4350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4123 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:20.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616133636432343535303234333734393063313838356638303939 Apr 12 19:41:20.229000 audit: BPF prog-id=140 op=UNLOAD Apr 12 19:41:20.229000 audit: BPF prog-id=139 op=UNLOAD Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { perfmon } for pid=4350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit[4350]: AVC avc: denied { bpf } for pid=4350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:20.229000 audit: BPF prog-id=141 op=LOAD Apr 12 19:41:20.229000 audit[4350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4123 pid=4350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:20.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616133636432343535303234333734393063313838356638303939 Apr 12 19:41:20.239083 env[2125]: time="2024-04-12T19:41:20.239051915Z" level=info msg="StartContainer for \"7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad\" returns successfully" Apr 12 19:41:20.522682 systemd[1]: cri-containerd-7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad.scope: Deactivated successfully. Apr 12 19:41:20.530000 audit: BPF prog-id=141 op=UNLOAD Apr 12 19:41:20.562228 kubelet[3415]: I0412 19:41:20.562201 3415 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 19:41:20.581683 kubelet[3415]: I0412 19:41:20.576125 3415 topology_manager.go:215] "Topology Admit Handler" podUID="962b0aa6-a7c8-42b7-bdca-52648a82dd4a" podNamespace="kube-system" podName="coredns-76f75df574-jz2tk" Apr 12 19:41:20.581683 kubelet[3415]: I0412 19:41:20.576439 3415 topology_manager.go:215] "Topology Admit Handler" podUID="1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837" podNamespace="kube-system" podName="coredns-76f75df574-h7cmc" Apr 12 19:41:20.581683 kubelet[3415]: I0412 19:41:20.576653 3415 topology_manager.go:215] "Topology Admit Handler" podUID="04e5c2c8-6872-48a1-b19e-63a4748f4f10" podNamespace="calico-system" podName="calico-kube-controllers-65f695c545-dnm6q" Apr 12 19:41:20.580406 systemd[1]: Created slice kubepods-burstable-pod962b0aa6_a7c8_42b7_bdca_52648a82dd4a.slice. Apr 12 19:41:20.583842 systemd[1]: Created slice kubepods-burstable-pod1a8ea956_a6c1_4f3f_8dfe_7cc4dc6c2837.slice. Apr 12 19:41:20.587136 systemd[1]: Created slice kubepods-besteffort-pod04e5c2c8_6872_48a1_b19e_63a4748f4f10.slice. Apr 12 19:41:20.679926 env[2125]: time="2024-04-12T19:41:20.679883466Z" level=info msg="shim disconnected" id=7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad Apr 12 19:41:20.679926 env[2125]: time="2024-04-12T19:41:20.679920466Z" level=warning msg="cleaning up after shim disconnected" id=7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad namespace=k8s.io Apr 12 19:41:20.679926 env[2125]: time="2024-04-12T19:41:20.679929227Z" level=info msg="cleaning up dead shim" Apr 12 19:41:20.686007 env[2125]: time="2024-04-12T19:41:20.685966580Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:41:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4419 runtime=io.containerd.runc.v2\n" Apr 12 19:41:20.693116 kubelet[3415]: I0412 19:41:20.693099 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04e5c2c8-6872-48a1-b19e-63a4748f4f10-tigera-ca-bundle\") pod \"calico-kube-controllers-65f695c545-dnm6q\" (UID: \"04e5c2c8-6872-48a1-b19e-63a4748f4f10\") " pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" Apr 12 19:41:20.693157 kubelet[3415]: I0412 19:41:20.693137 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-46tg8\" (UniqueName: \"kubernetes.io/projected/1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837-kube-api-access-46tg8\") pod \"coredns-76f75df574-h7cmc\" (UID: \"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837\") " pod="kube-system/coredns-76f75df574-h7cmc" Apr 12 19:41:20.693241 kubelet[3415]: I0412 19:41:20.693224 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mk946\" (UniqueName: \"kubernetes.io/projected/04e5c2c8-6872-48a1-b19e-63a4748f4f10-kube-api-access-mk946\") pod \"calico-kube-controllers-65f695c545-dnm6q\" (UID: \"04e5c2c8-6872-48a1-b19e-63a4748f4f10\") " pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" Apr 12 19:41:20.693276 kubelet[3415]: I0412 19:41:20.693269 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/962b0aa6-a7c8-42b7-bdca-52648a82dd4a-config-volume\") pod \"coredns-76f75df574-jz2tk\" (UID: \"962b0aa6-a7c8-42b7-bdca-52648a82dd4a\") " pod="kube-system/coredns-76f75df574-jz2tk" Apr 12 19:41:20.693305 kubelet[3415]: I0412 19:41:20.693300 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nv4w7\" (UniqueName: \"kubernetes.io/projected/962b0aa6-a7c8-42b7-bdca-52648a82dd4a-kube-api-access-nv4w7\") pod \"coredns-76f75df574-jz2tk\" (UID: \"962b0aa6-a7c8-42b7-bdca-52648a82dd4a\") " pod="kube-system/coredns-76f75df574-jz2tk" Apr 12 19:41:20.693331 kubelet[3415]: I0412 19:41:20.693326 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837-config-volume\") pod \"coredns-76f75df574-h7cmc\" (UID: \"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837\") " pod="kube-system/coredns-76f75df574-h7cmc" Apr 12 19:41:20.883063 env[2125]: time="2024-04-12T19:41:20.883028695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jz2tk,Uid:962b0aa6-a7c8-42b7-bdca-52648a82dd4a,Namespace:kube-system,Attempt:0,}" Apr 12 19:41:20.886598 env[2125]: time="2024-04-12T19:41:20.886576122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-h7cmc,Uid:1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837,Namespace:kube-system,Attempt:0,}" Apr 12 19:41:20.889044 env[2125]: time="2024-04-12T19:41:20.889019008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f695c545-dnm6q,Uid:04e5c2c8-6872-48a1-b19e-63a4748f4f10,Namespace:calico-system,Attempt:0,}" Apr 12 19:41:20.941472 env[2125]: time="2024-04-12T19:41:20.941414076Z" level=error msg="Failed to destroy network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.941835 env[2125]: time="2024-04-12T19:41:20.941809003Z" level=error msg="encountered an error cleaning up failed sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.941835 env[2125]: time="2024-04-12T19:41:20.941800243Z" level=error msg="Failed to destroy network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.941924 env[2125]: time="2024-04-12T19:41:20.941860204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-h7cmc,Uid:1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942073 kubelet[3415]: E0412 19:41:20.942056 3415 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942121 kubelet[3415]: E0412 19:41:20.942113 3415 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-h7cmc" Apr 12 19:41:20.942146 kubelet[3415]: E0412 19:41:20.942134 3415 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-h7cmc" Apr 12 19:41:20.942173 env[2125]: time="2024-04-12T19:41:20.942135570Z" level=error msg="encountered an error cleaning up failed sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942198 kubelet[3415]: E0412 19:41:20.942187 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-h7cmc_kube-system(1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-h7cmc_kube-system(1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-h7cmc" podUID="1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837" Apr 12 19:41:20.942251 env[2125]: time="2024-04-12T19:41:20.942186330Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jz2tk,Uid:962b0aa6-a7c8-42b7-bdca-52648a82dd4a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942276 env[2125]: time="2024-04-12T19:41:20.942199931Z" level=error msg="Failed to destroy network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942341 kubelet[3415]: E0412 19:41:20.942326 3415 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942379 kubelet[3415]: E0412 19:41:20.942366 3415 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-jz2tk" Apr 12 19:41:20.942407 kubelet[3415]: E0412 19:41:20.942385 3415 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-jz2tk" Apr 12 19:41:20.942434 kubelet[3415]: E0412 19:41:20.942426 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-jz2tk_kube-system(962b0aa6-a7c8-42b7-bdca-52648a82dd4a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-jz2tk_kube-system(962b0aa6-a7c8-42b7-bdca-52648a82dd4a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jz2tk" podUID="962b0aa6-a7c8-42b7-bdca-52648a82dd4a" Apr 12 19:41:20.942609 env[2125]: time="2024-04-12T19:41:20.942584018Z" level=error msg="encountered an error cleaning up failed sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942651 env[2125]: time="2024-04-12T19:41:20.942629579Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f695c545-dnm6q,Uid:04e5c2c8-6872-48a1-b19e-63a4748f4f10,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942753 kubelet[3415]: E0412 19:41:20.942739 3415 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:20.942783 kubelet[3415]: E0412 19:41:20.942775 3415 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" Apr 12 19:41:20.942809 kubelet[3415]: E0412 19:41:20.942798 3415 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" Apr 12 19:41:20.942851 kubelet[3415]: E0412 19:41:20.942837 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65f695c545-dnm6q_calico-system(04e5c2c8-6872-48a1-b19e-63a4748f4f10)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65f695c545-dnm6q_calico-system(04e5c2c8-6872-48a1-b19e-63a4748f4f10)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" podUID="04e5c2c8-6872-48a1-b19e-63a4748f4f10" Apr 12 19:41:21.030371 systemd[1]: Created slice kubepods-besteffort-pod23068c8c_d1e2_4ddd_beb1_96fdc90a60a7.slice. Apr 12 19:41:21.032034 env[2125]: time="2024-04-12T19:41:21.032010508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-srgsc,Uid:23068c8c-d1e2-4ddd-beb1-96fdc90a60a7,Namespace:calico-system,Attempt:0,}" Apr 12 19:41:21.066096 kubelet[3415]: I0412 19:41:21.066076 3415 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:21.066656 env[2125]: time="2024-04-12T19:41:21.066632719Z" level=info msg="StopPodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\"" Apr 12 19:41:21.066691 kubelet[3415]: I0412 19:41:21.066673 3415 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:21.067042 env[2125]: time="2024-04-12T19:41:21.067019766Z" level=info msg="StopPodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\"" Apr 12 19:41:21.068504 kubelet[3415]: I0412 19:41:21.068491 3415 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:21.068564 env[2125]: time="2024-04-12T19:41:21.068543833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 19:41:21.068863 env[2125]: time="2024-04-12T19:41:21.068827318Z" level=info msg="StopPodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\"" Apr 12 19:41:21.075579 env[2125]: time="2024-04-12T19:41:21.075540757Z" level=error msg="Failed to destroy network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.075913 env[2125]: time="2024-04-12T19:41:21.075885883Z" level=error msg="encountered an error cleaning up failed sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.075954 env[2125]: time="2024-04-12T19:41:21.075935084Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-srgsc,Uid:23068c8c-d1e2-4ddd-beb1-96fdc90a60a7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.076088 kubelet[3415]: E0412 19:41:21.076074 3415 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.076118 kubelet[3415]: E0412 19:41:21.076114 3415 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:21.076145 kubelet[3415]: E0412 19:41:21.076133 3415 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-srgsc" Apr 12 19:41:21.076193 kubelet[3415]: E0412 19:41:21.076183 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-srgsc_calico-system(23068c8c-d1e2-4ddd-beb1-96fdc90a60a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-srgsc_calico-system(23068c8c-d1e2-4ddd-beb1-96fdc90a60a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-srgsc" podUID="23068c8c-d1e2-4ddd-beb1-96fdc90a60a7" Apr 12 19:41:21.090151 env[2125]: time="2024-04-12T19:41:21.090097614Z" level=error msg="StopPodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" failed" error="failed to destroy network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.090369 env[2125]: time="2024-04-12T19:41:21.090332298Z" level=error msg="StopPodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" failed" error="failed to destroy network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.090400 kubelet[3415]: E0412 19:41:21.090358 3415 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:21.090441 kubelet[3415]: E0412 19:41:21.090433 3415 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300"} Apr 12 19:41:21.090479 kubelet[3415]: E0412 19:41:21.090469 3415 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"962b0aa6-a7c8-42b7-bdca-52648a82dd4a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:41:21.090519 kubelet[3415]: E0412 19:41:21.090471 3415 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:21.090519 kubelet[3415]: E0412 19:41:21.090496 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"962b0aa6-a7c8-42b7-bdca-52648a82dd4a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jz2tk" podUID="962b0aa6-a7c8-42b7-bdca-52648a82dd4a" Apr 12 19:41:21.090519 kubelet[3415]: E0412 19:41:21.090505 3415 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478"} Apr 12 19:41:21.090607 kubelet[3415]: E0412 19:41:21.090540 3415 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:41:21.090607 kubelet[3415]: E0412 19:41:21.090564 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-h7cmc" podUID="1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837" Apr 12 19:41:21.091536 env[2125]: time="2024-04-12T19:41:21.091493759Z" level=error msg="StopPodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" failed" error="failed to destroy network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:21.091660 kubelet[3415]: E0412 19:41:21.091646 3415 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:21.091690 kubelet[3415]: E0412 19:41:21.091675 3415 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b"} Apr 12 19:41:21.091721 kubelet[3415]: E0412 19:41:21.091715 3415 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04e5c2c8-6872-48a1-b19e-63a4748f4f10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:41:21.091758 kubelet[3415]: E0412 19:41:21.091738 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04e5c2c8-6872-48a1-b19e-63a4748f4f10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" podUID="04e5c2c8-6872-48a1-b19e-63a4748f4f10" Apr 12 19:41:21.204503 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7eaa3cd245502437490c1885f8099b59511d36360626a6c1fbe600ce81050cad-rootfs.mount: Deactivated successfully. Apr 12 19:41:22.072551 kubelet[3415]: I0412 19:41:22.072528 3415 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:22.072963 env[2125]: time="2024-04-12T19:41:22.072930825Z" level=info msg="StopPodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\"" Apr 12 19:41:22.094667 env[2125]: time="2024-04-12T19:41:22.094603424Z" level=error msg="StopPodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" failed" error="failed to destroy network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:41:22.094851 kubelet[3415]: E0412 19:41:22.094834 3415 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:22.094882 kubelet[3415]: E0412 19:41:22.094875 3415 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d"} Apr 12 19:41:22.094913 kubelet[3415]: E0412 19:41:22.094907 3415 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:41:22.094963 kubelet[3415]: E0412 19:41:22.094934 3415 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-srgsc" podUID="23068c8c-d1e2-4ddd-beb1-96fdc90a60a7" Apr 12 19:41:24.747006 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1557231732.mount: Deactivated successfully. Apr 12 19:41:24.775312 env[2125]: time="2024-04-12T19:41:24.775272011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:24.776014 env[2125]: time="2024-04-12T19:41:24.775989861Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:24.777354 env[2125]: time="2024-04-12T19:41:24.777336921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:24.778334 env[2125]: time="2024-04-12T19:41:24.778313775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:24.778884 env[2125]: time="2024-04-12T19:41:24.778858223Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 19:41:24.784575 env[2125]: time="2024-04-12T19:41:24.784553946Z" level=info msg="CreateContainer within sandbox \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 19:41:24.790861 env[2125]: time="2024-04-12T19:41:24.790833237Z" level=info msg="CreateContainer within sandbox \"a8a26992b7e9d9c7e28c8f05aa8912106dacdeaa8b9042d9a9c53a1ae3288f05\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0666c53207237f98bdba0344f770123109e90a6bdcd4001a96e41233541b38e1\"" Apr 12 19:41:24.791174 env[2125]: time="2024-04-12T19:41:24.791152562Z" level=info msg="StartContainer for \"0666c53207237f98bdba0344f770123109e90a6bdcd4001a96e41233541b38e1\"" Apr 12 19:41:24.804681 systemd[1]: Started cri-containerd-0666c53207237f98bdba0344f770123109e90a6bdcd4001a96e41233541b38e1.scope. Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.834308 kernel: kauditd_printk_skb: 147 callbacks suppressed Apr 12 19:41:24.834415 kernel: audit: type=1400 audit(1712950884.821:1141): avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4123 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:24.928073 kernel: audit: type=1300 audit(1712950884.821:1141): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4123 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:24.928125 kernel: audit: type=1327 audit(1712950884.821:1141): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363663353332303732333766393862646261303334346637373031 Apr 12 19:41:24.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363663353332303732333766393862646261303334346637373031 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.988840 env[2125]: time="2024-04-12T19:41:24.988806320Z" level=info msg="StartContainer for \"0666c53207237f98bdba0344f770123109e90a6bdcd4001a96e41233541b38e1\" returns successfully" Apr 12 19:41:25.018891 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.057278 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.057305 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.089980 kubelet[3415]: I0412 19:41:25.089962 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-p6rp8" podStartSLOduration=1.053484147 podStartE2EDuration="10.089918672s" podCreationTimestamp="2024-04-12 19:41:15 +0000 UTC" firstStartedPulling="2024-04-12 19:41:15.74259098 +0000 UTC m=+19.784422735" lastFinishedPulling="2024-04-12 19:41:24.779025505 +0000 UTC m=+28.820857260" observedRunningTime="2024-04-12 19:41:25.089072501 +0000 UTC m=+29.130904256" watchObservedRunningTime="2024-04-12 19:41:25.089918672 +0000 UTC m=+29.131750427" Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.133793 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.133859 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.210919 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:25.210934 kernel: audit: type=1400 audit(1712950884.821:1142): avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.821000 audit: BPF prog-id=142 op=LOAD Apr 12 19:41:24.821000 audit[4811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4123 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:24.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363663353332303732333766393862646261303334346637373031 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.833000 audit: BPF prog-id=143 op=LOAD Apr 12 19:41:24.833000 audit[4811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4123 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:24.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363663353332303732333766393862646261303334346637373031 Apr 12 19:41:24.871000 audit: BPF prog-id=143 op=UNLOAD Apr 12 19:41:24.871000 audit: BPF prog-id=142 op=UNLOAD Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:24.871000 audit: BPF prog-id=144 op=LOAD Apr 12 19:41:24.871000 audit[4811]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4123 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:24.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363663353332303732333766393862646261303334346637373031 Apr 12 19:41:25.299728 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 19:41:25.299776 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 19:41:26.079932 kubelet[3415]: I0412 19:41:26.079903 3415 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:41:26.498000 audit[4933]: AVC avc: denied { write } for pid=4933 comm="tee" name="fd" dev="proc" ino=29902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4933]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf9d3971 a2=241 a3=1b6 items=1 ppid=4904 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=28886 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.498000 audit[4934]: AVC avc: denied { write } for pid=4934 comm="tee" name="fd" dev="proc" ino=90436 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4932]: AVC avc: denied { write } for pid=4932 comm="tee" name="fd" dev="proc" ino=89134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4934]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeef61973 a2=241 a3=1b6 items=1 ppid=4898 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 19:41:26.498000 audit[4932]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3e60962 a2=241 a3=1b6 items=1 ppid=4897 pid=4932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=69805 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=70836 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.498000 audit[4937]: AVC avc: denied { write } for pid=4937 comm="tee" name="fd" dev="proc" ino=33890 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4937]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8fe9961 a2=241 a3=1b6 items=1 ppid=4902 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=100869 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.498000 audit[4954]: AVC avc: denied { write } for pid=4954 comm="tee" name="fd" dev="proc" ino=22784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4954]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe34d2972 a2=241 a3=1b6 items=1 ppid=4899 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=65745 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.498000 audit[4953]: AVC avc: denied { write } for pid=4953 comm="tee" name="fd" dev="proc" ino=92656 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4953]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa5cd971 a2=241 a3=1b6 items=1 ppid=4903 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=69085 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.498000 audit[4956]: AVC avc: denied { write } for pid=4956 comm="tee" name="fd" dev="proc" ino=13437 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:41:26.498000 audit[4956]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd5c75971 a2=241 a3=1b6 items=1 ppid=4900 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.498000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 19:41:26.498000 audit: PATH item=0 name="/dev/fd/63" inode=66640 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:41:26.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.648000 audit: BPF prog-id=145 op=LOAD Apr 12 19:41:26.648000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff0400318 a2=70 a3=fffff0400388 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.648000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit: BPF prog-id=145 op=UNLOAD Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit: BPF prog-id=146 op=LOAD Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff0400318 a2=70 a3=4b243c items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit: BPF prog-id=146 op=UNLOAD Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff04002d0 a2=70 a3=fffff0400340 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit: BPF prog-id=147 op=LOAD Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff04002b8 a2=70 a3=fffff0400328 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit: BPF prog-id=147 op=UNLOAD Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff0400388 a2=70 a3=0 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff0400378 a2=70 a3=0 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff04002e8 a2=70 a3=0 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffff04003c0 a2=70 a3=139369ef items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.649000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.649000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff04003c0 a2=70 a3=139369ef items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.649000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.650000 audit: BPF prog-id=148 op=LOAD Apr 12 19:41:26.650000 audit[5088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff04002e8 a2=70 a3=13936a09 items=0 ppid=4910 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.650000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:41:26.652000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.652000 audit[5092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffec058018 a2=70 a3=ffffec058088 items=0 ppid=4910 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:41:26.652000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:26.652000 audit[5092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffec057ee8 a2=70 a3=ffffec057f58 items=0 ppid=4910 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:41:26.666000 audit: BPF prog-id=148 op=UNLOAD Apr 12 19:41:26.715000 audit[5278]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=5278 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:26.715000 audit[5278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffdf1fcfc0 a2=0 a3=ffff8ea06fa8 items=0 ppid=4910 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:26.718000 audit[5277]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=5277 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:26.718000 audit[5277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffd2c41430 a2=0 a3=ffffb436cfa8 items=0 ppid=4910 pid=5277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.718000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:26.721000 audit[5281]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=5281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:26.721000 audit[5281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffef66ac30 a2=0 a3=ffffbc249fa8 items=0 ppid=4910 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.721000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:26.722000 audit[5279]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=5279 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:26.722000 audit[5279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc6f21cc0 a2=0 a3=ffffa7363fa8 items=0 ppid=4910 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:26.722000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:27.573954 systemd-networkd[1940]: vxlan.calico: Link UP Apr 12 19:41:27.573958 systemd-networkd[1940]: vxlan.calico: Gained carrier Apr 12 19:41:28.989401 systemd-networkd[1940]: vxlan.calico: Gained IPv6LL Apr 12 19:41:33.027043 env[2125]: time="2024-04-12T19:41:33.026980963Z" level=info msg="StopPodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\"" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.068 [INFO][5319] k8s.go 585: Cleaning up netns ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.068 [INFO][5319] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" iface="eth0" netns="/var/run/netns/cni-cfda3004-d984-6554-2ab9-616178ca9735" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.068 [INFO][5319] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" iface="eth0" netns="/var/run/netns/cni-cfda3004-d984-6554-2ab9-616178ca9735" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.069 [INFO][5319] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" iface="eth0" netns="/var/run/netns/cni-cfda3004-d984-6554-2ab9-616178ca9735" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.069 [INFO][5319] k8s.go 592: Releasing IP address(es) ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.069 [INFO][5319] utils.go 188: Calico CNI releasing IP address ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.100 [INFO][5337] ipam_plugin.go 415: Releasing address using handleID ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.100 [INFO][5337] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.100 [INFO][5337] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.108 [WARNING][5337] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.108 [INFO][5337] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.110 [INFO][5337] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:33.112444 env[2125]: 2024-04-12 19:41:33.111 [INFO][5319] k8s.go 598: Teardown processing complete. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:33.112822 env[2125]: time="2024-04-12T19:41:33.112642541Z" level=info msg="TearDown network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" successfully" Apr 12 19:41:33.112822 env[2125]: time="2024-04-12T19:41:33.112669261Z" level=info msg="StopPodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" returns successfully" Apr 12 19:41:33.113160 env[2125]: time="2024-04-12T19:41:33.113136585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-h7cmc,Uid:1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837,Namespace:kube-system,Attempt:1,}" Apr 12 19:41:33.114350 systemd[1]: run-netns-cni\x2dcfda3004\x2dd984\x2d6554\x2d2ab9\x2d616178ca9735.mount: Deactivated successfully. Apr 12 19:41:33.207478 systemd-networkd[1940]: cali0088c7ec336: Link UP Apr 12 19:41:33.233094 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:41:33.233132 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0088c7ec336: link becomes ready Apr 12 19:41:33.233196 systemd-networkd[1940]: cali0088c7ec336: Gained carrier Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.150 [INFO][5351] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0 coredns-76f75df574- kube-system 1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837 680 0 2024-04-12 19:41:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-f02954802e coredns-76f75df574-h7cmc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0088c7ec336 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.150 [INFO][5351] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.173 [INFO][5378] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" HandleID="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.184 [INFO][5378] ipam_plugin.go 268: Auto assigning IP ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" HandleID="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000684620), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-f02954802e", "pod":"coredns-76f75df574-h7cmc", "timestamp":"2024-04-12 19:41:33.17381356 +0000 UTC"}, Hostname:"ci-3510.3.3-a-f02954802e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.184 [INFO][5378] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.184 [INFO][5378] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.184 [INFO][5378] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-f02954802e' Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.185 [INFO][5378] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.188 [INFO][5378] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.191 [INFO][5378] ipam.go 489: Trying affinity for 192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.193 [INFO][5378] ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.194 [INFO][5378] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.194 [INFO][5378] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.197 [INFO][5378] ipam.go 1682: Creating new handle: k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64 Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.201 [INFO][5378] ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.204 [INFO][5378] ipam.go 1216: Successfully claimed IPs: [192.168.112.65/26] block=192.168.112.64/26 handle="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.204 [INFO][5378] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.65/26] handle="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.204 [INFO][5378] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:33.240230 env[2125]: 2024-04-12 19:41:33.204 [INFO][5378] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.112.65/26] IPv6=[] ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" HandleID="k8s-pod-network.1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.240689 env[2125]: 2024-04-12 19:41:33.206 [INFO][5351] k8s.go 385: Populated endpoint ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"", Pod:"coredns-76f75df574-h7cmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0088c7ec336", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:33.240689 env[2125]: 2024-04-12 19:41:33.206 [INFO][5351] k8s.go 386: Calico CNI using IPs: [192.168.112.65/32] ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.240689 env[2125]: 2024-04-12 19:41:33.206 [INFO][5351] dataplane_linux.go 68: Setting the host side veth name to cali0088c7ec336 ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.240689 env[2125]: 2024-04-12 19:41:33.233 [INFO][5351] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.240689 env[2125]: 2024-04-12 19:41:33.233 [INFO][5351] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64", Pod:"coredns-76f75df574-h7cmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0088c7ec336", MAC:"ea:59:64:cf:9f:a5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:33.240689 env[2125]: 2024-04-12 19:41:33.239 [INFO][5351] k8s.go 498: Wrote updated endpoint to datastore ContainerID="1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64" Namespace="kube-system" Pod="coredns-76f75df574-h7cmc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:33.249447 env[2125]: time="2024-04-12T19:41:33.249398255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:33.249447 env[2125]: time="2024-04-12T19:41:33.249433936Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:33.249447 env[2125]: time="2024-04-12T19:41:33.249444376Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:33.249607 env[2125]: time="2024-04-12T19:41:33.249581577Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64 pid=5422 runtime=io.containerd.runc.v2 Apr 12 19:41:33.250000 audit[5431]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=5431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:33.260686 systemd[1]: Started cri-containerd-1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64.scope. Apr 12 19:41:33.262539 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 19:41:33.262600 kernel: audit: type=1325 audit(1712950893.250:1174): table=filter:101 family=2 entries=36 op=nft_register_chain pid=5431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:33.250000 audit[5431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=fffff1615cf0 a2=0 a3=ffff97a6ffa8 items=0 ppid=4910 pid=5431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.346976 kernel: audit: type=1300 audit(1712950893.250:1174): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=fffff1615cf0 a2=0 a3=ffff97a6ffa8 items=0 ppid=4910 pid=5431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.347030 kernel: audit: type=1327 audit(1712950893.250:1174): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:33.250000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420820 kernel: audit: type=1400 audit(1712950893.318:1175): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420902 kernel: audit: type=1400 audit(1712950893.318:1176): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.496055 kernel: audit: type=1400 audit(1712950893.318:1177): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.496091 kernel: audit: type=1400 audit(1712950893.318:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.572028 kernel: audit: type=1400 audit(1712950893.318:1179): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.572077 kernel: audit: type=1400 audit(1712950893.318:1180): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.618858 env[2125]: time="2024-04-12T19:41:33.618831505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-h7cmc,Uid:1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837,Namespace:kube-system,Attempt:1,} returns sandbox id \"1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64\"" Apr 12 19:41:33.620833 env[2125]: time="2024-04-12T19:41:33.620809761Z" level=info msg="CreateContainer within sandbox \"1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 19:41:33.648239 kernel: audit: type=1400 audit(1712950893.318:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.346000 audit: BPF prog-id=149 op=LOAD Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5422 pid=5433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162646431356331333363643432333065643861366131646261343935 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5422 pid=5433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162646431356331333363643432333065643861366131646261343935 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.347000 audit: BPF prog-id=150 op=LOAD Apr 12 19:41:33.347000 audit[5433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5422 pid=5433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162646431356331333363643432333065643861366131646261343935 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.382000 audit: BPF prog-id=151 op=LOAD Apr 12 19:41:33.382000 audit[5433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5422 pid=5433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162646431356331333363643432333065643861366131646261343935 Apr 12 19:41:33.420000 audit: BPF prog-id=151 op=UNLOAD Apr 12 19:41:33.420000 audit: BPF prog-id=150 op=UNLOAD Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { perfmon } for pid=5433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit[5433]: AVC avc: denied { bpf } for pid=5433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.420000 audit: BPF prog-id=152 op=LOAD Apr 12 19:41:33.420000 audit[5433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5422 pid=5433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162646431356331333363643432333065643861366131646261343935 Apr 12 19:41:33.651060 env[2125]: time="2024-04-12T19:41:33.651016927Z" level=info msg="CreateContainer within sandbox \"1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"eebff3feb276c0e7b61a891db6f0982a5899c3afeb4e7103416c79c22dd5216c\"" Apr 12 19:41:33.651490 env[2125]: time="2024-04-12T19:41:33.651464651Z" level=info msg="StartContainer for \"eebff3feb276c0e7b61a891db6f0982a5899c3afeb4e7103416c79c22dd5216c\"" Apr 12 19:41:33.664277 systemd[1]: Started cri-containerd-eebff3feb276c0e7b61a891db6f0982a5899c3afeb4e7103416c79c22dd5216c.scope. Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.678000 audit: BPF prog-id=153 op=LOAD Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5422 pid=5466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565626666336665623237366330653762363161383931646236663039 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5422 pid=5466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565626666336665623237366330653762363161383931646236663039 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit: BPF prog-id=154 op=LOAD Apr 12 19:41:33.679000 audit[5466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5422 pid=5466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565626666336665623237366330653762363161383931646236663039 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit: BPF prog-id=155 op=LOAD Apr 12 19:41:33.679000 audit[5466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5422 pid=5466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565626666336665623237366330653762363161383931646236663039 Apr 12 19:41:33.679000 audit: BPF prog-id=155 op=UNLOAD Apr 12 19:41:33.679000 audit: BPF prog-id=154 op=UNLOAD Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { perfmon } for pid=5466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit[5466]: AVC avc: denied { bpf } for pid=5466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:33.679000 audit: BPF prog-id=156 op=LOAD Apr 12 19:41:33.679000 audit[5466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5422 pid=5466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:33.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565626666336665623237366330653762363161383931646236663039 Apr 12 19:41:33.688201 env[2125]: time="2024-04-12T19:41:33.688172190Z" level=info msg="StartContainer for \"eebff3feb276c0e7b61a891db6f0982a5899c3afeb4e7103416c79c22dd5216c\" returns successfully" Apr 12 19:41:34.098876 kubelet[3415]: I0412 19:41:34.098294 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-h7cmc" podStartSLOduration=23.098244761 podStartE2EDuration="23.098244761s" podCreationTimestamp="2024-04-12 19:41:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:41:34.097707917 +0000 UTC m=+38.139539712" watchObservedRunningTime="2024-04-12 19:41:34.098244761 +0000 UTC m=+38.140076516" Apr 12 19:41:34.104000 audit[5511]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=5511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:34.104000 audit[5511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffcddb1610 a2=0 a3=1 items=0 ppid=3800 pid=5511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:34.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:34.128000 audit[5511]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=5511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:34.128000 audit[5511]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcddb1610 a2=0 a3=1 items=0 ppid=3800 pid=5511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:34.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:34.132000 audit[5513]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=5513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:34.132000 audit[5513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdc311d40 a2=0 a3=1 items=0 ppid=3800 pid=5513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:34.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:34.156000 audit[5513]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=5513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:34.156000 audit[5513]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffdc311d40 a2=0 a3=1 items=0 ppid=3800 pid=5513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:34.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:35.005399 systemd-networkd[1940]: cali0088c7ec336: Gained IPv6LL Apr 12 19:41:35.026767 env[2125]: time="2024-04-12T19:41:35.026735799Z" level=info msg="StopPodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\"" Apr 12 19:41:35.026948 env[2125]: time="2024-04-12T19:41:35.026803640Z" level=info msg="StopPodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\"" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.064 [INFO][5548] k8s.go 585: Cleaning up netns ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.065 [INFO][5548] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" iface="eth0" netns="/var/run/netns/cni-6c419316-9aba-30fe-5c8e-547c70b95227" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.066 [INFO][5548] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" iface="eth0" netns="/var/run/netns/cni-6c419316-9aba-30fe-5c8e-547c70b95227" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.066 [INFO][5548] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" iface="eth0" netns="/var/run/netns/cni-6c419316-9aba-30fe-5c8e-547c70b95227" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.066 [INFO][5548] k8s.go 592: Releasing IP address(es) ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.066 [INFO][5548] utils.go 188: Calico CNI releasing IP address ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.083 [INFO][5589] ipam_plugin.go 415: Releasing address using handleID ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.083 [INFO][5589] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.083 [INFO][5589] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.091 [WARNING][5589] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.091 [INFO][5589] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.092 [INFO][5589] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:35.094411 env[2125]: 2024-04-12 19:41:35.093 [INFO][5548] k8s.go 598: Teardown processing complete. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:35.095389 env[2125]: time="2024-04-12T19:41:35.095148649Z" level=info msg="TearDown network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" successfully" Apr 12 19:41:35.095389 env[2125]: time="2024-04-12T19:41:35.095175609Z" level=info msg="StopPodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" returns successfully" Apr 12 19:41:35.095568 env[2125]: time="2024-04-12T19:41:35.095548372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jz2tk,Uid:962b0aa6-a7c8-42b7-bdca-52648a82dd4a,Namespace:kube-system,Attempt:1,}" Apr 12 19:41:35.096356 systemd[1]: run-netns-cni\x2d6c419316\x2d9aba\x2d30fe\x2d5c8e\x2d547c70b95227.mount: Deactivated successfully. Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.065 [INFO][5549] k8s.go 585: Cleaning up netns ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.065 [INFO][5549] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" iface="eth0" netns="/var/run/netns/cni-7ec8e9b2-7219-d286-9b7e-956c337cfa01" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.065 [INFO][5549] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" iface="eth0" netns="/var/run/netns/cni-7ec8e9b2-7219-d286-9b7e-956c337cfa01" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.065 [INFO][5549] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" iface="eth0" netns="/var/run/netns/cni-7ec8e9b2-7219-d286-9b7e-956c337cfa01" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.065 [INFO][5549] k8s.go 592: Releasing IP address(es) ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.065 [INFO][5549] utils.go 188: Calico CNI releasing IP address ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.083 [INFO][5588] ipam_plugin.go 415: Releasing address using handleID ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.083 [INFO][5588] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.092 [INFO][5588] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.099 [WARNING][5588] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.099 [INFO][5588] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.100 [INFO][5588] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:35.104060 env[2125]: 2024-04-12 19:41:35.102 [INFO][5549] k8s.go 598: Teardown processing complete. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:35.104371 env[2125]: time="2024-04-12T19:41:35.104203194Z" level=info msg="TearDown network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" successfully" Apr 12 19:41:35.104371 env[2125]: time="2024-04-12T19:41:35.104225994Z" level=info msg="StopPodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" returns successfully" Apr 12 19:41:35.104627 env[2125]: time="2024-04-12T19:41:35.104602437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f695c545-dnm6q,Uid:04e5c2c8-6872-48a1-b19e-63a4748f4f10,Namespace:calico-system,Attempt:1,}" Apr 12 19:41:35.105707 systemd[1]: run-netns-cni\x2d7ec8e9b2\x2d7219\x2dd286\x2d9b7e\x2d956c337cfa01.mount: Deactivated successfully. Apr 12 19:41:35.190603 systemd-networkd[1940]: cali4047de45549: Link UP Apr 12 19:41:35.216053 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:41:35.216116 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4047de45549: link becomes ready Apr 12 19:41:35.216344 systemd-networkd[1940]: cali4047de45549: Gained carrier Apr 12 19:41:35.217134 systemd-networkd[1940]: cali18867986d1f: Link UP Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.134 [INFO][5623] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0 coredns-76f75df574- kube-system 962b0aa6-a7c8-42b7-bdca-52648a82dd4a 702 0 2024-04-12 19:41:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-f02954802e coredns-76f75df574-jz2tk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4047de45549 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.134 [INFO][5623] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.155 [INFO][5676] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" HandleID="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.169 [INFO][5676] ipam_plugin.go 268: Auto assigning IP ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" HandleID="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004db40), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-f02954802e", "pod":"coredns-76f75df574-jz2tk", "timestamp":"2024-04-12 19:41:35.155626242 +0000 UTC"}, Hostname:"ci-3510.3.3-a-f02954802e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.169 [INFO][5676] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.169 [INFO][5676] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.169 [INFO][5676] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-f02954802e' Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.170 [INFO][5676] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.173 [INFO][5676] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.176 [INFO][5676] ipam.go 489: Trying affinity for 192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.177 [INFO][5676] ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.179 [INFO][5676] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.179 [INFO][5676] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.181 [INFO][5676] ipam.go 1682: Creating new handle: k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.183 [INFO][5676] ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.187 [INFO][5676] ipam.go 1216: Successfully claimed IPs: [192.168.112.66/26] block=192.168.112.64/26 handle="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.187 [INFO][5676] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.66/26] handle="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.187 [INFO][5676] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:35.223429 env[2125]: 2024-04-12 19:41:35.187 [INFO][5676] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.112.66/26] IPv6=[] ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" HandleID="k8s-pod-network.4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.224616 env[2125]: 2024-04-12 19:41:35.189 [INFO][5623] k8s.go 385: Populated endpoint ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"962b0aa6-a7c8-42b7-bdca-52648a82dd4a", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"", Pod:"coredns-76f75df574-jz2tk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4047de45549", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:35.224616 env[2125]: 2024-04-12 19:41:35.189 [INFO][5623] k8s.go 386: Calico CNI using IPs: [192.168.112.66/32] ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.224616 env[2125]: 2024-04-12 19:41:35.189 [INFO][5623] dataplane_linux.go 68: Setting the host side veth name to cali4047de45549 ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.224616 env[2125]: 2024-04-12 19:41:35.216 [INFO][5623] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.224616 env[2125]: 2024-04-12 19:41:35.216 [INFO][5623] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"962b0aa6-a7c8-42b7-bdca-52648a82dd4a", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c", Pod:"coredns-76f75df574-jz2tk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4047de45549", MAC:"36:88:55:76:c0:7e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:35.224616 env[2125]: 2024-04-12 19:41:35.222 [INFO][5623] k8s.go 498: Wrote updated endpoint to datastore ContainerID="4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c" Namespace="kube-system" Pod="coredns-76f75df574-jz2tk" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:35.230745 systemd-networkd[1940]: cali18867986d1f: Gained carrier Apr 12 19:41:35.231292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali18867986d1f: link becomes ready Apr 12 19:41:35.231000 audit[5738]: NETFILTER_CFG table=filter:106 family=2 entries=30 op=nft_register_chain pid=5738 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:35.231000 audit[5738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17032 a0=3 a1=fffff8854700 a2=0 a3=ffffb59d2fa8 items=0 ppid=4910 pid=5738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.231000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:35.233164 env[2125]: time="2024-04-12T19:41:35.233112597Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:35.233164 env[2125]: time="2024-04-12T19:41:35.233148637Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:35.233164 env[2125]: time="2024-04-12T19:41:35.233158877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:35.233314 env[2125]: time="2024-04-12T19:41:35.233280998Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c pid=5741 runtime=io.containerd.runc.v2 Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.134 [INFO][5634] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0 calico-kube-controllers-65f695c545- calico-system 04e5c2c8-6872-48a1-b19e-63a4748f4f10 703 0 2024-04-12 19:41:15 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65f695c545 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-f02954802e calico-kube-controllers-65f695c545-dnm6q eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali18867986d1f [] []}} ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.135 [INFO][5634] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.156 [INFO][5678] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" HandleID="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.170 [INFO][5678] ipam_plugin.go 268: Auto assigning IP ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" HandleID="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000393640), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-f02954802e", "pod":"calico-kube-controllers-65f695c545-dnm6q", "timestamp":"2024-04-12 19:41:35.156427688 +0000 UTC"}, Hostname:"ci-3510.3.3-a-f02954802e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.170 [INFO][5678] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.187 [INFO][5678] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.187 [INFO][5678] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-f02954802e' Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.189 [INFO][5678] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.193 [INFO][5678] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.196 [INFO][5678] ipam.go 489: Trying affinity for 192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.197 [INFO][5678] ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.199 [INFO][5678] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.199 [INFO][5678] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.200 [INFO][5678] ipam.go 1682: Creating new handle: k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645 Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.202 [INFO][5678] ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.206 [INFO][5678] ipam.go 1216: Successfully claimed IPs: [192.168.112.67/26] block=192.168.112.64/26 handle="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.206 [INFO][5678] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.67/26] handle="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.206 [INFO][5678] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:35.238400 env[2125]: 2024-04-12 19:41:35.206 [INFO][5678] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.112.67/26] IPv6=[] ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" HandleID="k8s-pod-network.795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.238852 env[2125]: 2024-04-12 19:41:35.207 [INFO][5634] k8s.go 385: Populated endpoint ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0", GenerateName:"calico-kube-controllers-65f695c545-", Namespace:"calico-system", SelfLink:"", UID:"04e5c2c8-6872-48a1-b19e-63a4748f4f10", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f695c545", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"", Pod:"calico-kube-controllers-65f695c545-dnm6q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.112.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali18867986d1f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:35.238852 env[2125]: 2024-04-12 19:41:35.208 [INFO][5634] k8s.go 386: Calico CNI using IPs: [192.168.112.67/32] ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.238852 env[2125]: 2024-04-12 19:41:35.208 [INFO][5634] dataplane_linux.go 68: Setting the host side veth name to cali18867986d1f ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.238852 env[2125]: 2024-04-12 19:41:35.230 [INFO][5634] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.238852 env[2125]: 2024-04-12 19:41:35.230 [INFO][5634] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0", GenerateName:"calico-kube-controllers-65f695c545-", Namespace:"calico-system", SelfLink:"", UID:"04e5c2c8-6872-48a1-b19e-63a4748f4f10", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f695c545", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645", Pod:"calico-kube-controllers-65f695c545-dnm6q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.112.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali18867986d1f", MAC:"2e:4c:c8:ed:74:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:35.238852 env[2125]: 2024-04-12 19:41:35.236 [INFO][5634] k8s.go 498: Wrote updated endpoint to datastore ContainerID="795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645" Namespace="calico-system" Pod="calico-kube-controllers-65f695c545-dnm6q" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:35.245142 systemd[1]: Started cri-containerd-4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c.scope. Apr 12 19:41:35.248958 env[2125]: time="2024-04-12T19:41:35.248886510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:35.248958 env[2125]: time="2024-04-12T19:41:35.248922190Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:35.248958 env[2125]: time="2024-04-12T19:41:35.248932910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:35.249060 env[2125]: time="2024-04-12T19:41:35.249031871Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645 pid=5779 runtime=io.containerd.runc.v2 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.256000 audit: BPF prog-id=157 op=LOAD Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5741 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316239353162623031626233623364373261343932383538626663 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5741 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316239353162623031626233623364373261343932383538626663 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit: BPF prog-id=158 op=LOAD Apr 12 19:41:35.257000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5741 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316239353162623031626233623364373261343932383538626663 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit: BPF prog-id=159 op=LOAD Apr 12 19:41:35.257000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5741 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316239353162623031626233623364373261343932383538626663 Apr 12 19:41:35.257000 audit: BPF prog-id=159 op=UNLOAD Apr 12 19:41:35.257000 audit: BPF prog-id=158 op=UNLOAD Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { perfmon } for pid=5751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit[5751]: AVC avc: denied { bpf } for pid=5751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.257000 audit: BPF prog-id=160 op=LOAD Apr 12 19:41:35.257000 audit[5751]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5741 pid=5751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316239353162623031626233623364373261343932383538626663 Apr 12 19:41:35.259260 systemd[1]: Started cri-containerd-795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645.scope. Apr 12 19:41:35.258000 audit[5808]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=5808 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:35.258000 audit[5808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22780 a0=3 a1=ffffd7719a10 a2=0 a3=ffff95fccfa8 items=0 ppid=4910 pid=5808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:35.272918 env[2125]: time="2024-04-12T19:41:35.272884842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jz2tk,Uid:962b0aa6-a7c8-42b7-bdca-52648a82dd4a,Namespace:kube-system,Attempt:1,} returns sandbox id \"4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c\"" Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.272000 audit: BPF prog-id=161 op=LOAD Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5779 pid=5795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353138383237336335366533373361333864613531666132666562 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5779 pid=5795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353138383237336335366533373361333864613531666132666562 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit: BPF prog-id=162 op=LOAD Apr 12 19:41:35.273000 audit[5795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5779 pid=5795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353138383237336335366533373361333864613531666132666562 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit: BPF prog-id=163 op=LOAD Apr 12 19:41:35.273000 audit[5795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5779 pid=5795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353138383237336335366533373361333864613531666132666562 Apr 12 19:41:35.273000 audit: BPF prog-id=163 op=UNLOAD Apr 12 19:41:35.273000 audit: BPF prog-id=162 op=UNLOAD Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { perfmon } for pid=5795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit[5795]: AVC avc: denied { bpf } for pid=5795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.273000 audit: BPF prog-id=164 op=LOAD Apr 12 19:41:35.273000 audit[5795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5779 pid=5795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739353138383237336335366533373361333864613531666132666562 Apr 12 19:41:35.274877 env[2125]: time="2024-04-12T19:41:35.274853736Z" level=info msg="CreateContainer within sandbox \"4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 19:41:35.280123 env[2125]: time="2024-04-12T19:41:35.280094853Z" level=info msg="CreateContainer within sandbox \"4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"293e97cf1acb7dcefc2de2feac747fe1a4ed3dc3be5387a00a88e300b675c3cf\"" Apr 12 19:41:35.280448 env[2125]: time="2024-04-12T19:41:35.280422496Z" level=info msg="StartContainer for \"293e97cf1acb7dcefc2de2feac747fe1a4ed3dc3be5387a00a88e300b675c3cf\"" Apr 12 19:41:35.287219 env[2125]: time="2024-04-12T19:41:35.287190664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f695c545-dnm6q,Uid:04e5c2c8-6872-48a1-b19e-63a4748f4f10,Namespace:calico-system,Attempt:1,} returns sandbox id \"795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645\"" Apr 12 19:41:35.288228 env[2125]: time="2024-04-12T19:41:35.288208992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 19:41:35.292006 systemd[1]: Started cri-containerd-293e97cf1acb7dcefc2de2feac747fe1a4ed3dc3be5387a00a88e300b675c3cf.scope. Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit: BPF prog-id=165 op=LOAD Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5741 pid=5839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336539376366316163623764636566633264653266656163373437 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5741 pid=5839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336539376366316163623764636566633264653266656163373437 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit: BPF prog-id=166 op=LOAD Apr 12 19:41:35.307000 audit[5839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5741 pid=5839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336539376366316163623764636566633264653266656163373437 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit: BPF prog-id=167 op=LOAD Apr 12 19:41:35.307000 audit[5839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5741 pid=5839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336539376366316163623764636566633264653266656163373437 Apr 12 19:41:35.307000 audit: BPF prog-id=167 op=UNLOAD Apr 12 19:41:35.307000 audit: BPF prog-id=166 op=UNLOAD Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { perfmon } for pid=5839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit[5839]: AVC avc: denied { bpf } for pid=5839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:35.307000 audit: BPF prog-id=168 op=LOAD Apr 12 19:41:35.307000 audit[5839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5741 pid=5839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:35.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239336539376366316163623764636566633264653266656163373437 Apr 12 19:41:35.316665 env[2125]: time="2024-04-12T19:41:35.316629515Z" level=info msg="StartContainer for \"293e97cf1acb7dcefc2de2feac747fe1a4ed3dc3be5387a00a88e300b675c3cf\" returns successfully" Apr 12 19:41:36.027190 env[2125]: time="2024-04-12T19:41:36.027141710Z" level=info msg="StopPodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\"" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.062 [INFO][5903] k8s.go 585: Cleaning up netns ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.063 [INFO][5903] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" iface="eth0" netns="/var/run/netns/cni-e9d64ba4-4854-ef26-1ca7-da4e70e9ab82" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.063 [INFO][5903] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" iface="eth0" netns="/var/run/netns/cni-e9d64ba4-4854-ef26-1ca7-da4e70e9ab82" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.063 [INFO][5903] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" iface="eth0" netns="/var/run/netns/cni-e9d64ba4-4854-ef26-1ca7-da4e70e9ab82" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.063 [INFO][5903] k8s.go 592: Releasing IP address(es) ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.063 [INFO][5903] utils.go 188: Calico CNI releasing IP address ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.080 [INFO][5919] ipam_plugin.go 415: Releasing address using handleID ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.080 [INFO][5919] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.080 [INFO][5919] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.088 [WARNING][5919] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.088 [INFO][5919] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.089 [INFO][5919] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:36.091385 env[2125]: 2024-04-12 19:41:36.090 [INFO][5903] k8s.go 598: Teardown processing complete. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:36.091764 env[2125]: time="2024-04-12T19:41:36.091544903Z" level=info msg="TearDown network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" successfully" Apr 12 19:41:36.091764 env[2125]: time="2024-04-12T19:41:36.091576663Z" level=info msg="StopPodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" returns successfully" Apr 12 19:41:36.092077 env[2125]: time="2024-04-12T19:41:36.092051306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-srgsc,Uid:23068c8c-d1e2-4ddd-beb1-96fdc90a60a7,Namespace:calico-system,Attempt:1,}" Apr 12 19:41:36.100948 kubelet[3415]: I0412 19:41:36.100926 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-jz2tk" podStartSLOduration=25.100888205 podStartE2EDuration="25.100888205s" podCreationTimestamp="2024-04-12 19:41:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 19:41:36.100690084 +0000 UTC m=+40.142521839" watchObservedRunningTime="2024-04-12 19:41:36.100888205 +0000 UTC m=+40.142719920" Apr 12 19:41:36.107000 audit[5955]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=5955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:36.107000 audit[5955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe4db2300 a2=0 a3=1 items=0 ppid=3800 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:36.116210 systemd[1]: run-netns-cni\x2de9d64ba4\x2d4854\x2def26\x2d1ca7\x2dda4e70e9ab82.mount: Deactivated successfully. Apr 12 19:41:36.125000 audit[5955]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=5955 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:36.125000 audit[5955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffe4db2300 a2=0 a3=1 items=0 ppid=3800 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:36.182703 systemd-networkd[1940]: cali7086855f8ae: Link UP Apr 12 19:41:36.196126 systemd-networkd[1940]: cali7086855f8ae: Gained carrier Apr 12 19:41:36.196293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7086855f8ae: link becomes ready Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.127 [INFO][5939] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0 csi-node-driver- calico-system 23068c8c-d1e2-4ddd-beb1-96fdc90a60a7 717 0 2024-04-12 19:41:15 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-f02954802e csi-node-driver-srgsc eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7086855f8ae [] []}} ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.128 [INFO][5939] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.151 [INFO][5968] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" HandleID="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.161 [INFO][5968] ipam_plugin.go 268: Auto assigning IP ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" HandleID="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000348990), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-f02954802e", "pod":"csi-node-driver-srgsc", "timestamp":"2024-04-12 19:41:36.151468585 +0000 UTC"}, Hostname:"ci-3510.3.3-a-f02954802e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.161 [INFO][5968] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.161 [INFO][5968] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.161 [INFO][5968] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-f02954802e' Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.162 [INFO][5968] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.165 [INFO][5968] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.168 [INFO][5968] ipam.go 489: Trying affinity for 192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.169 [INFO][5968] ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.171 [INFO][5968] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.171 [INFO][5968] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.172 [INFO][5968] ipam.go 1682: Creating new handle: k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.175 [INFO][5968] ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.179 [INFO][5968] ipam.go 1216: Successfully claimed IPs: [192.168.112.68/26] block=192.168.112.64/26 handle="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.179 [INFO][5968] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.68/26] handle="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.179 [INFO][5968] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:36.203187 env[2125]: 2024-04-12 19:41:36.179 [INFO][5968] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.112.68/26] IPv6=[] ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" HandleID="k8s-pod-network.3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.203721 env[2125]: 2024-04-12 19:41:36.181 [INFO][5939] k8s.go 385: Populated endpoint ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"", Pod:"csi-node-driver-srgsc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7086855f8ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:36.203721 env[2125]: 2024-04-12 19:41:36.181 [INFO][5939] k8s.go 386: Calico CNI using IPs: [192.168.112.68/32] ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.203721 env[2125]: 2024-04-12 19:41:36.181 [INFO][5939] dataplane_linux.go 68: Setting the host side veth name to cali7086855f8ae ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.203721 env[2125]: 2024-04-12 19:41:36.196 [INFO][5939] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.203721 env[2125]: 2024-04-12 19:41:36.196 [INFO][5939] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad", Pod:"csi-node-driver-srgsc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7086855f8ae", MAC:"3e:b6:03:17:60:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:36.203721 env[2125]: 2024-04-12 19:41:36.202 [INFO][5939] k8s.go 498: Wrote updated endpoint to datastore ContainerID="3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad" Namespace="calico-system" Pod="csi-node-driver-srgsc" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:36.211809 env[2125]: time="2024-04-12T19:41:36.211764110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:36.211809 env[2125]: time="2024-04-12T19:41:36.211799030Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:36.211851 env[2125]: time="2024-04-12T19:41:36.211809070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:36.212001 env[2125]: time="2024-04-12T19:41:36.211973351Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad pid=6008 runtime=io.containerd.runc.v2 Apr 12 19:41:36.212000 audit[6013]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=6013 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:36.212000 audit[6013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=fffffa08ebe0 a2=0 a3=ffff86ae2fa8 items=0 ppid=4910 pid=6013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.212000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:36.224606 systemd[1]: Started cri-containerd-3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad.scope. Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.235000 audit: BPF prog-id=169 op=LOAD Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6008 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313331643736333232663463353631393266383461646639646639 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6008 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313331643736333232663463353631393266383461646639646639 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit: BPF prog-id=170 op=LOAD Apr 12 19:41:36.236000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6008 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313331643736333232663463353631393266383461646639646639 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit: BPF prog-id=171 op=LOAD Apr 12 19:41:36.236000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6008 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313331643736333232663463353631393266383461646639646639 Apr 12 19:41:36.236000 audit: BPF prog-id=171 op=UNLOAD Apr 12 19:41:36.236000 audit: BPF prog-id=170 op=UNLOAD Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.236000 audit: BPF prog-id=172 op=LOAD Apr 12 19:41:36.236000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6008 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313331643736333232663463353631393266383461646639646639 Apr 12 19:41:36.244015 env[2125]: time="2024-04-12T19:41:36.243985606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-srgsc,Uid:23068c8c-d1e2-4ddd-beb1-96fdc90a60a7,Namespace:calico-system,Attempt:1,} returns sandbox id \"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad\"" Apr 12 19:41:36.249387 env[2125]: time="2024-04-12T19:41:36.249369082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.249999 env[2125]: time="2024-04-12T19:41:36.249976166Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.251045 env[2125]: time="2024-04-12T19:41:36.251027573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.252055 env[2125]: time="2024-04-12T19:41:36.252037260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.252510 env[2125]: time="2024-04-12T19:41:36.252494983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 19:41:36.252875 env[2125]: time="2024-04-12T19:41:36.252858225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 19:41:36.257727 env[2125]: time="2024-04-12T19:41:36.257707738Z" level=info msg="CreateContainer within sandbox \"795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 19:41:36.262700 env[2125]: time="2024-04-12T19:41:36.262667571Z" level=info msg="CreateContainer within sandbox \"795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9f502bf41e9656b6db8914959ced813779244e11a6ffcbbfb153832fb1ef8858\"" Apr 12 19:41:36.262989 env[2125]: time="2024-04-12T19:41:36.262964453Z" level=info msg="StartContainer for \"9f502bf41e9656b6db8914959ced813779244e11a6ffcbbfb153832fb1ef8858\"" Apr 12 19:41:36.275526 systemd[1]: Started cri-containerd-9f502bf41e9656b6db8914959ced813779244e11a6ffcbbfb153832fb1ef8858.scope. Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.290000 audit: BPF prog-id=173 op=LOAD Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5779 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353032626634316539363536623664623839313439353963656438 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5779 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353032626634316539363536623664623839313439353963656438 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit: BPF prog-id=174 op=LOAD Apr 12 19:41:36.291000 audit[6051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5779 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353032626634316539363536623664623839313439353963656438 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit: BPF prog-id=175 op=LOAD Apr 12 19:41:36.291000 audit[6051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5779 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353032626634316539363536623664623839313439353963656438 Apr 12 19:41:36.291000 audit: BPF prog-id=175 op=UNLOAD Apr 12 19:41:36.291000 audit: BPF prog-id=174 op=UNLOAD Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { perfmon } for pid=6051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit[6051]: AVC avc: denied { bpf } for pid=6051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.291000 audit: BPF prog-id=176 op=LOAD Apr 12 19:41:36.291000 audit[6051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5779 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353032626634316539363536623664623839313439353963656438 Apr 12 19:41:36.305995 env[2125]: time="2024-04-12T19:41:36.305961582Z" level=info msg="StartContainer for \"9f502bf41e9656b6db8914959ced813779244e11a6ffcbbfb153832fb1ef8858\" returns successfully" Apr 12 19:41:36.669409 systemd-networkd[1940]: cali18867986d1f: Gained IPv6LL Apr 12 19:41:36.862964 env[2125]: time="2024-04-12T19:41:36.862923881Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.863569 env[2125]: time="2024-04-12T19:41:36.863545725Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.864472 env[2125]: time="2024-04-12T19:41:36.864449171Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.865274 env[2125]: time="2024-04-12T19:41:36.865259416Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:36.865728 env[2125]: time="2024-04-12T19:41:36.865709619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 19:41:36.867173 env[2125]: time="2024-04-12T19:41:36.867149189Z" level=info msg="CreateContainer within sandbox \"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 19:41:36.873540 env[2125]: time="2024-04-12T19:41:36.873509712Z" level=info msg="CreateContainer within sandbox \"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c5d7e19ec98b54c0f42d8eecea042240244bfd35c8d3a8ff7954de42227426e3\"" Apr 12 19:41:36.873892 env[2125]: time="2024-04-12T19:41:36.873869194Z" level=info msg="StartContainer for \"c5d7e19ec98b54c0f42d8eecea042240244bfd35c8d3a8ff7954de42227426e3\"" Apr 12 19:41:36.887224 systemd[1]: Started cri-containerd-c5d7e19ec98b54c0f42d8eecea042240244bfd35c8d3a8ff7954de42227426e3.scope. Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6008 pid=6107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643765313965633938623534633066343264386565636561303432 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit: BPF prog-id=177 op=LOAD Apr 12 19:41:36.903000 audit[6107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6008 pid=6107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643765313965633938623534633066343264386565636561303432 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit: BPF prog-id=178 op=LOAD Apr 12 19:41:36.903000 audit[6107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6008 pid=6107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643765313965633938623534633066343264386565636561303432 Apr 12 19:41:36.903000 audit: BPF prog-id=178 op=UNLOAD Apr 12 19:41:36.903000 audit: BPF prog-id=177 op=UNLOAD Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { perfmon } for pid=6107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit[6107]: AVC avc: denied { bpf } for pid=6107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:36.903000 audit: BPF prog-id=179 op=LOAD Apr 12 19:41:36.903000 audit[6107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6008 pid=6107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643765313965633938623534633066343264386565636561303432 Apr 12 19:41:36.912817 env[2125]: time="2024-04-12T19:41:36.912787775Z" level=info msg="StartContainer for \"c5d7e19ec98b54c0f42d8eecea042240244bfd35c8d3a8ff7954de42227426e3\" returns successfully" Apr 12 19:41:36.913598 env[2125]: time="2024-04-12T19:41:36.913576701Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 19:41:37.106249 kubelet[3415]: I0412 19:41:37.106225 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-65f695c545-dnm6q" podStartSLOduration=21.141452875 podStartE2EDuration="22.106184509s" podCreationTimestamp="2024-04-12 19:41:15 +0000 UTC" firstStartedPulling="2024-04-12 19:41:35.28797475 +0000 UTC m=+39.329806505" lastFinishedPulling="2024-04-12 19:41:36.252706384 +0000 UTC m=+40.294538139" observedRunningTime="2024-04-12 19:41:37.105587425 +0000 UTC m=+41.147419180" watchObservedRunningTime="2024-04-12 19:41:37.106184509 +0000 UTC m=+41.148016224" Apr 12 19:41:37.117369 systemd-networkd[1940]: cali4047de45549: Gained IPv6LL Apr 12 19:41:37.119000 audit[6141]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=6141 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:37.119000 audit[6141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd3582040 a2=0 a3=1 items=0 ppid=3800 pid=6141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:37.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:37.124000 audit[6141]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=6141 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:37.124000 audit[6141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd3582040 a2=0 a3=1 items=0 ppid=3800 pid=6141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:37.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:37.327432 env[2125]: time="2024-04-12T19:41:37.327403381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:37.328026 env[2125]: time="2024-04-12T19:41:37.328005905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:37.328921 env[2125]: time="2024-04-12T19:41:37.328903391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:37.329790 env[2125]: time="2024-04-12T19:41:37.329775716Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:37.330221 env[2125]: time="2024-04-12T19:41:37.330196919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 19:41:37.331663 env[2125]: time="2024-04-12T19:41:37.331641008Z" level=info msg="CreateContainer within sandbox \"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 19:41:37.337657 env[2125]: time="2024-04-12T19:41:37.337630446Z" level=info msg="CreateContainer within sandbox \"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ee6ea1fbf715dc38c8c2b34e8a1c5bd85cd1eee36feb8f45038d100902b1ba17\"" Apr 12 19:41:37.337997 env[2125]: time="2024-04-12T19:41:37.337973608Z" level=info msg="StartContainer for \"ee6ea1fbf715dc38c8c2b34e8a1c5bd85cd1eee36feb8f45038d100902b1ba17\"" Apr 12 19:41:37.353145 systemd[1]: Started cri-containerd-ee6ea1fbf715dc38c8c2b34e8a1c5bd85cd1eee36feb8f45038d100902b1ba17.scope. Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=6008 pid=6150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:37.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366561316662663731356463333863386332623334653861316335 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit: BPF prog-id=180 op=LOAD Apr 12 19:41:37.367000 audit[6150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=6008 pid=6150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:37.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366561316662663731356463333863386332623334653861316335 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.367000 audit: BPF prog-id=181 op=LOAD Apr 12 19:41:37.367000 audit[6150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=6008 pid=6150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:37.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366561316662663731356463333863386332623334653861316335 Apr 12 19:41:37.368000 audit: BPF prog-id=181 op=UNLOAD Apr 12 19:41:37.368000 audit: BPF prog-id=180 op=UNLOAD Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { perfmon } for pid=6150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit[6150]: AVC avc: denied { bpf } for pid=6150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:37.368000 audit: BPF prog-id=182 op=LOAD Apr 12 19:41:37.368000 audit[6150]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=6008 pid=6150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:37.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565366561316662663731356463333863386332623334653861316335 Apr 12 19:41:37.379045 env[2125]: time="2024-04-12T19:41:37.379012066Z" level=info msg="StartContainer for \"ee6ea1fbf715dc38c8c2b34e8a1c5bd85cd1eee36feb8f45038d100902b1ba17\" returns successfully" Apr 12 19:41:38.013420 systemd-networkd[1940]: cali7086855f8ae: Gained IPv6LL Apr 12 19:41:38.073020 kubelet[3415]: I0412 19:41:38.072998 3415 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 19:41:38.073077 kubelet[3415]: I0412 19:41:38.073034 3415 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 19:41:38.108808 kubelet[3415]: I0412 19:41:38.108787 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-srgsc" podStartSLOduration=22.023150867 podStartE2EDuration="23.108750656s" podCreationTimestamp="2024-04-12 19:41:15 +0000 UTC" firstStartedPulling="2024-04-12 19:41:36.244797371 +0000 UTC m=+40.286629126" lastFinishedPulling="2024-04-12 19:41:37.33039712 +0000 UTC m=+41.372228915" observedRunningTime="2024-04-12 19:41:38.108280533 +0000 UTC m=+42.150112288" watchObservedRunningTime="2024-04-12 19:41:38.108750656 +0000 UTC m=+42.150582411" Apr 12 19:41:39.048654 kubelet[3415]: I0412 19:41:39.048594 3415 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:41:44.639000 audit[6263]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=6263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.643221 kubelet[3415]: I0412 19:41:44.643194 3415 topology_manager.go:215] "Topology Admit Handler" podUID="e9ab9212-8323-4bdd-aa32-43bd37846236" podNamespace="calico-apiserver" podName="calico-apiserver-65df9f8f6d-bqghm" Apr 12 19:41:44.645371 kubelet[3415]: I0412 19:41:44.645352 3415 topology_manager.go:215] "Topology Admit Handler" podUID="2534ec03-9427-4928-b769-59bcd4cf19d2" podNamespace="calico-apiserver" podName="calico-apiserver-65df9f8f6d-f6rqn" Apr 12 19:41:44.647986 systemd[1]: Created slice kubepods-besteffort-pode9ab9212_8323_4bdd_aa32_43bd37846236.slice. Apr 12 19:41:44.651248 kernel: kauditd_printk_skb: 511 callbacks suppressed Apr 12 19:41:44.651424 kernel: audit: type=1325 audit(1712950904.639:1324): table=filter:113 family=2 entries=9 op=nft_register_rule pid=6263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.652966 systemd[1]: Created slice kubepods-besteffort-pod2534ec03_9427_4928_b769_59bcd4cf19d2.slice. Apr 12 19:41:44.639000 audit[6263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffff194140 a2=0 a3=1 items=0 ppid=3800 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.707401 kubelet[3415]: I0412 19:41:44.707378 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2534ec03-9427-4928-b769-59bcd4cf19d2-calico-apiserver-certs\") pod \"calico-apiserver-65df9f8f6d-f6rqn\" (UID: \"2534ec03-9427-4928-b769-59bcd4cf19d2\") " pod="calico-apiserver/calico-apiserver-65df9f8f6d-f6rqn" Apr 12 19:41:44.707476 kubelet[3415]: I0412 19:41:44.707418 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5qhtg\" (UniqueName: \"kubernetes.io/projected/e9ab9212-8323-4bdd-aa32-43bd37846236-kube-api-access-5qhtg\") pod \"calico-apiserver-65df9f8f6d-bqghm\" (UID: \"e9ab9212-8323-4bdd-aa32-43bd37846236\") " pod="calico-apiserver/calico-apiserver-65df9f8f6d-bqghm" Apr 12 19:41:44.707476 kubelet[3415]: I0412 19:41:44.707442 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbc6p\" (UniqueName: \"kubernetes.io/projected/2534ec03-9427-4928-b769-59bcd4cf19d2-kube-api-access-sbc6p\") pod \"calico-apiserver-65df9f8f6d-f6rqn\" (UID: \"2534ec03-9427-4928-b769-59bcd4cf19d2\") " pod="calico-apiserver/calico-apiserver-65df9f8f6d-f6rqn" Apr 12 19:41:44.707476 kubelet[3415]: I0412 19:41:44.707465 3415 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e9ab9212-8323-4bdd-aa32-43bd37846236-calico-apiserver-certs\") pod \"calico-apiserver-65df9f8f6d-bqghm\" (UID: \"e9ab9212-8323-4bdd-aa32-43bd37846236\") " pod="calico-apiserver/calico-apiserver-65df9f8f6d-bqghm" Apr 12 19:41:44.732679 kernel: audit: type=1300 audit(1712950904.639:1324): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffff194140 a2=0 a3=1 items=0 ppid=3800 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.732710 kernel: audit: type=1327 audit(1712950904.639:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:44.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:44.640000 audit[6263]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=6263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.640000 audit[6263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffff194140 a2=0 a3=1 items=0 ppid=3800 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.808465 kubelet[3415]: E0412 19:41:44.808446 3415 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 19:41:44.808532 kubelet[3415]: E0412 19:41:44.808508 3415 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e9ab9212-8323-4bdd-aa32-43bd37846236-calico-apiserver-certs podName:e9ab9212-8323-4bdd-aa32-43bd37846236 nodeName:}" failed. No retries permitted until 2024-04-12 19:41:45.308491323 +0000 UTC m=+49.350323038 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e9ab9212-8323-4bdd-aa32-43bd37846236-calico-apiserver-certs") pod "calico-apiserver-65df9f8f6d-bqghm" (UID: "e9ab9212-8323-4bdd-aa32-43bd37846236") : secret "calico-apiserver-certs" not found Apr 12 19:41:44.808619 kubelet[3415]: E0412 19:41:44.808563 3415 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 19:41:44.808665 kubelet[3415]: E0412 19:41:44.808628 3415 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2534ec03-9427-4928-b769-59bcd4cf19d2-calico-apiserver-certs podName:2534ec03-9427-4928-b769-59bcd4cf19d2 nodeName:}" failed. No retries permitted until 2024-04-12 19:41:45.308612763 +0000 UTC m=+49.350444478 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2534ec03-9427-4928-b769-59bcd4cf19d2-calico-apiserver-certs") pod "calico-apiserver-65df9f8f6d-f6rqn" (UID: "2534ec03-9427-4928-b769-59bcd4cf19d2") : secret "calico-apiserver-certs" not found Apr 12 19:41:44.847311 kernel: audit: type=1325 audit(1712950904.640:1325): table=nat:114 family=2 entries=20 op=nft_register_rule pid=6263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.847338 kernel: audit: type=1300 audit(1712950904.640:1325): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffff194140 a2=0 a3=1 items=0 ppid=3800 pid=6263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.847393 kernel: audit: type=1327 audit(1712950904.640:1325): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:44.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:44.772000 audit[6265]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=6265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.772000 audit[6265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd16b9460 a2=0 a3=1 items=0 ppid=3800 pid=6265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.974355 kernel: audit: type=1325 audit(1712950904.772:1326): table=filter:115 family=2 entries=10 op=nft_register_rule pid=6265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.974411 kernel: audit: type=1300 audit(1712950904.772:1326): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd16b9460 a2=0 a3=1 items=0 ppid=3800 pid=6265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.974488 kernel: audit: type=1327 audit(1712950904.772:1326): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:44.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:44.892000 audit[6265]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=6265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:44.892000 audit[6265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd16b9460 a2=0 a3=1 items=0 ppid=3800 pid=6265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:44.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:45.034296 kernel: audit: type=1325 audit(1712950904.892:1327): table=nat:116 family=2 entries=20 op=nft_register_rule pid=6265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:45.550546 env[2125]: time="2024-04-12T19:41:45.550512877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65df9f8f6d-bqghm,Uid:e9ab9212-8323-4bdd-aa32-43bd37846236,Namespace:calico-apiserver,Attempt:0,}" Apr 12 19:41:45.554990 env[2125]: time="2024-04-12T19:41:45.554962454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65df9f8f6d-f6rqn,Uid:2534ec03-9427-4928-b769-59bcd4cf19d2,Namespace:calico-apiserver,Attempt:0,}" Apr 12 19:41:45.635323 systemd-networkd[1940]: cali6bf54772cff: Link UP Apr 12 19:41:45.660504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:41:45.660561 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6bf54772cff: link becomes ready Apr 12 19:41:45.660615 systemd-networkd[1940]: cali6bf54772cff: Gained carrier Apr 12 19:41:45.661577 systemd-networkd[1940]: cali4e7a2bc4b9f: Link UP Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.582 [INFO][6271] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0 calico-apiserver-65df9f8f6d- calico-apiserver e9ab9212-8323-4bdd-aa32-43bd37846236 817 0 2024-04-12 19:41:44 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65df9f8f6d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-f02954802e calico-apiserver-65df9f8f6d-bqghm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6bf54772cff [] []}} ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.582 [INFO][6271] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.605 [INFO][6326] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" HandleID="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.615 [INFO][6326] ipam_plugin.go 268: Auto assigning IP ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" HandleID="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003b97d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-f02954802e", "pod":"calico-apiserver-65df9f8f6d-bqghm", "timestamp":"2024-04-12 19:41:45.605250523 +0000 UTC"}, Hostname:"ci-3510.3.3-a-f02954802e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.615 [INFO][6326] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.615 [INFO][6326] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.615 [INFO][6326] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-f02954802e' Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.616 [INFO][6326] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.619 [INFO][6326] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.622 [INFO][6326] ipam.go 489: Trying affinity for 192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.623 [INFO][6326] ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.625 [INFO][6326] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.625 [INFO][6326] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.626 [INFO][6326] ipam.go 1682: Creating new handle: k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.628 [INFO][6326] ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.632 [INFO][6326] ipam.go 1216: Successfully claimed IPs: [192.168.112.69/26] block=192.168.112.64/26 handle="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.632 [INFO][6326] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.69/26] handle="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.632 [INFO][6326] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:45.667025 env[2125]: 2024-04-12 19:41:45.632 [INFO][6326] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.112.69/26] IPv6=[] ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" HandleID="k8s-pod-network.d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.667642 env[2125]: 2024-04-12 19:41:45.634 [INFO][6271] k8s.go 385: Populated endpoint ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0", GenerateName:"calico-apiserver-65df9f8f6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e9ab9212-8323-4bdd-aa32-43bd37846236", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65df9f8f6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"", Pod:"calico-apiserver-65df9f8f6d-bqghm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.112.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6bf54772cff", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:45.667642 env[2125]: 2024-04-12 19:41:45.634 [INFO][6271] k8s.go 386: Calico CNI using IPs: [192.168.112.69/32] ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.667642 env[2125]: 2024-04-12 19:41:45.634 [INFO][6271] dataplane_linux.go 68: Setting the host side veth name to cali6bf54772cff ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.667642 env[2125]: 2024-04-12 19:41:45.660 [INFO][6271] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.667642 env[2125]: 2024-04-12 19:41:45.661 [INFO][6271] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0", GenerateName:"calico-apiserver-65df9f8f6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e9ab9212-8323-4bdd-aa32-43bd37846236", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65df9f8f6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf", Pod:"calico-apiserver-65df9f8f6d-bqghm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.112.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6bf54772cff", MAC:"0a:d5:87:a9:ea:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:45.667642 env[2125]: 2024-04-12 19:41:45.665 [INFO][6271] k8s.go 498: Wrote updated endpoint to datastore ContainerID="d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-bqghm" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--bqghm-eth0" Apr 12 19:41:45.675074 systemd-networkd[1940]: cali4e7a2bc4b9f: Gained carrier Apr 12 19:41:45.675292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4e7a2bc4b9f: link becomes ready Apr 12 19:41:45.676425 env[2125]: time="2024-04-12T19:41:45.676381470Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:45.676425 env[2125]: time="2024-04-12T19:41:45.676417230Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:45.676482 env[2125]: time="2024-04-12T19:41:45.676427830Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:45.676566 env[2125]: time="2024-04-12T19:41:45.676544430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf pid=6385 runtime=io.containerd.runc.v2 Apr 12 19:41:45.678000 audit[6397]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=6397 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:45.678000 audit[6397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=ffffdc3c1e70 a2=0 a3=ffffb3b8afa8 items=0 ppid=4910 pid=6397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.678000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.585 [INFO][6281] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0 calico-apiserver-65df9f8f6d- calico-apiserver 2534ec03-9427-4928-b769-59bcd4cf19d2 819 0 2024-04-12 19:41:44 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65df9f8f6d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-f02954802e calico-apiserver-65df9f8f6d-f6rqn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4e7a2bc4b9f [] []}} ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.586 [INFO][6281] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.606 [INFO][6332] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" HandleID="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.619 [INFO][6332] ipam_plugin.go 268: Auto assigning IP ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" HandleID="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005fe650), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-f02954802e", "pod":"calico-apiserver-65df9f8f6d-f6rqn", "timestamp":"2024-04-12 19:41:45.606706288 +0000 UTC"}, Hostname:"ci-3510.3.3-a-f02954802e", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.619 [INFO][6332] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.632 [INFO][6332] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.632 [INFO][6332] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-f02954802e' Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.634 [INFO][6332] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.637 [INFO][6332] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.640 [INFO][6332] ipam.go 489: Trying affinity for 192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.641 [INFO][6332] ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.643 [INFO][6332] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.643 [INFO][6332] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.644 [INFO][6332] ipam.go 1682: Creating new handle: k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.646 [INFO][6332] ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.650 [INFO][6332] ipam.go 1216: Successfully claimed IPs: [192.168.112.70/26] block=192.168.112.64/26 handle="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.650 [INFO][6332] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.70/26] handle="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" host="ci-3510.3.3-a-f02954802e" Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.650 [INFO][6332] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:45.681273 env[2125]: 2024-04-12 19:41:45.650 [INFO][6332] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.112.70/26] IPv6=[] ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" HandleID="k8s-pod-network.2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.681709 env[2125]: 2024-04-12 19:41:45.652 [INFO][6281] k8s.go 385: Populated endpoint ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0", GenerateName:"calico-apiserver-65df9f8f6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"2534ec03-9427-4928-b769-59bcd4cf19d2", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65df9f8f6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"", Pod:"calico-apiserver-65df9f8f6d-f6rqn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.112.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4e7a2bc4b9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:45.681709 env[2125]: 2024-04-12 19:41:45.652 [INFO][6281] k8s.go 386: Calico CNI using IPs: [192.168.112.70/32] ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.681709 env[2125]: 2024-04-12 19:41:45.652 [INFO][6281] dataplane_linux.go 68: Setting the host side veth name to cali4e7a2bc4b9f ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.681709 env[2125]: 2024-04-12 19:41:45.675 [INFO][6281] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.681709 env[2125]: 2024-04-12 19:41:45.675 [INFO][6281] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0", GenerateName:"calico-apiserver-65df9f8f6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"2534ec03-9427-4928-b769-59bcd4cf19d2", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65df9f8f6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e", Pod:"calico-apiserver-65df9f8f6d-f6rqn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.112.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4e7a2bc4b9f", MAC:"76:b7:79:d4:54:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:45.681709 env[2125]: 2024-04-12 19:41:45.679 [INFO][6281] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e" Namespace="calico-apiserver" Pod="calico-apiserver-65df9f8f6d-f6rqn" WorkloadEndpoint="ci--3510.3.3--a--f02954802e-k8s-calico--apiserver--65df9f8f6d--f6rqn-eth0" Apr 12 19:41:45.686841 systemd[1]: Started cri-containerd-d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf.scope. Apr 12 19:41:45.691352 env[2125]: time="2024-04-12T19:41:45.691301486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:41:45.691352 env[2125]: time="2024-04-12T19:41:45.691339686Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:41:45.691352 env[2125]: time="2024-04-12T19:41:45.691350806Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:41:45.691578 env[2125]: time="2024-04-12T19:41:45.691554487Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e pid=6430 runtime=io.containerd.runc.v2 Apr 12 19:41:45.690000 audit[6429]: NETFILTER_CFG table=filter:118 family=2 entries=56 op=nft_register_chain pid=6429 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:41:45.690000 audit[6429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27932 a0=3 a1=ffffe5c90410 a2=0 a3=ffffbbdbafa8 items=0 ppid=4910 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.690000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:41:45.700864 systemd[1]: Started cri-containerd-2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e.scope. Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.701000 audit: BPF prog-id=183 op=LOAD Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6385 pid=6398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313536656339666539373865383965333135313762343561376331 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6385 pid=6398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313536656339666539373865383965333135313762343561376331 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit: BPF prog-id=184 op=LOAD Apr 12 19:41:45.702000 audit[6398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6385 pid=6398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313536656339666539373865383965333135313762343561376331 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit: BPF prog-id=185 op=LOAD Apr 12 19:41:45.702000 audit[6398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6385 pid=6398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313536656339666539373865383965333135313762343561376331 Apr 12 19:41:45.702000 audit: BPF prog-id=185 op=UNLOAD Apr 12 19:41:45.702000 audit: BPF prog-id=184 op=UNLOAD Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { perfmon } for pid=6398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit[6398]: AVC avc: denied { bpf } for pid=6398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.702000 audit: BPF prog-id=186 op=LOAD Apr 12 19:41:45.702000 audit[6398]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6385 pid=6398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313536656339666539373865383965333135313762343561376331 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit: BPF prog-id=187 op=LOAD Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=6430 pid=6448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636338366138373963313239383833623138623265623231313537 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=6430 pid=6448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636338366138373963313239383833623138623265623231313537 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit: BPF prog-id=188 op=LOAD Apr 12 19:41:45.715000 audit[6448]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=6430 pid=6448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636338366138373963313239383833623138623265623231313537 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.715000 audit: BPF prog-id=189 op=LOAD Apr 12 19:41:45.715000 audit[6448]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=6430 pid=6448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636338366138373963313239383833623138623265623231313537 Apr 12 19:41:45.716000 audit: BPF prog-id=189 op=UNLOAD Apr 12 19:41:45.716000 audit: BPF prog-id=188 op=UNLOAD Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { perfmon } for pid=6448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit[6448]: AVC avc: denied { bpf } for pid=6448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:45.716000 audit: BPF prog-id=190 op=LOAD Apr 12 19:41:45.716000 audit[6448]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=6430 pid=6448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:45.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636338366138373963313239383833623138623265623231313537 Apr 12 19:41:45.717110 env[2125]: time="2024-04-12T19:41:45.716894462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65df9f8f6d-bqghm,Uid:e9ab9212-8323-4bdd-aa32-43bd37846236,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf\"" Apr 12 19:41:45.717912 env[2125]: time="2024-04-12T19:41:45.717889706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 19:41:45.731027 env[2125]: time="2024-04-12T19:41:45.731001675Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65df9f8f6d-f6rqn,Uid:2534ec03-9427-4928-b769-59bcd4cf19d2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e\"" Apr 12 19:41:46.035884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3791505367.mount: Deactivated successfully. Apr 12 19:41:46.823527 env[2125]: time="2024-04-12T19:41:46.823484664Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.824062 env[2125]: time="2024-04-12T19:41:46.824043426Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.826789 env[2125]: time="2024-04-12T19:41:46.826764276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.827820 env[2125]: time="2024-04-12T19:41:46.827792359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 19:41:46.828394 env[2125]: time="2024-04-12T19:41:46.828368801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 19:41:46.828655 env[2125]: time="2024-04-12T19:41:46.828622122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.829426 env[2125]: time="2024-04-12T19:41:46.829397405Z" level=info msg="CreateContainer within sandbox \"d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 19:41:46.833663 env[2125]: time="2024-04-12T19:41:46.833637580Z" level=info msg="CreateContainer within sandbox \"d5156ec9fe978e89e31517b45a7c192551d055fb0a5fd9c84ed28eb745bc2adf\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"35ce36212dbbb221dda160db0654962eed8bfbcbdb173814e5d8f767c7da5191\"" Apr 12 19:41:46.833969 env[2125]: time="2024-04-12T19:41:46.833948101Z" level=info msg="StartContainer for \"35ce36212dbbb221dda160db0654962eed8bfbcbdb173814e5d8f767c7da5191\"" Apr 12 19:41:46.845370 systemd-networkd[1940]: cali6bf54772cff: Gained IPv6LL Apr 12 19:41:46.850461 systemd[1]: Started cri-containerd-35ce36212dbbb221dda160db0654962eed8bfbcbdb173814e5d8f767c7da5191.scope. Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.862000 audit: BPF prog-id=191 op=LOAD Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6385 pid=6491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636533363231326462626232323164646131363064623036353439 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6385 pid=6491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636533363231326462626232323164646131363064623036353439 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit: BPF prog-id=192 op=LOAD Apr 12 19:41:46.863000 audit[6491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6385 pid=6491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636533363231326462626232323164646131363064623036353439 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit: BPF prog-id=193 op=LOAD Apr 12 19:41:46.863000 audit[6491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6385 pid=6491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636533363231326462626232323164646131363064623036353439 Apr 12 19:41:46.863000 audit: BPF prog-id=193 op=UNLOAD Apr 12 19:41:46.863000 audit: BPF prog-id=192 op=UNLOAD Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { perfmon } for pid=6491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit[6491]: AVC avc: denied { bpf } for pid=6491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.863000 audit: BPF prog-id=194 op=LOAD Apr 12 19:41:46.863000 audit[6491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6385 pid=6491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636533363231326462626232323164646131363064623036353439 Apr 12 19:41:46.878544 env[2125]: time="2024-04-12T19:41:46.878509578Z" level=info msg="StartContainer for \"35ce36212dbbb221dda160db0654962eed8bfbcbdb173814e5d8f767c7da5191\" returns successfully" Apr 12 19:41:46.883259 env[2125]: time="2024-04-12T19:41:46.883234555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.883902 env[2125]: time="2024-04-12T19:41:46.883880517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.884903 env[2125]: time="2024-04-12T19:41:46.884882240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.885885 env[2125]: time="2024-04-12T19:41:46.885862324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:41:46.886292 env[2125]: time="2024-04-12T19:41:46.886264445Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 19:41:46.887698 env[2125]: time="2024-04-12T19:41:46.887674010Z" level=info msg="CreateContainer within sandbox \"2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 19:41:46.896206 env[2125]: time="2024-04-12T19:41:46.896177040Z" level=info msg="CreateContainer within sandbox \"2ccc86a879c129883b18b2eb2115728d5fd2f17cbf659fd3ecb501d56191813e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"acec71d76700ad7228179a535f9f1cdd458e789aec46dd1f69af62edcaec2799\"" Apr 12 19:41:46.896526 env[2125]: time="2024-04-12T19:41:46.896501241Z" level=info msg="StartContainer for \"acec71d76700ad7228179a535f9f1cdd458e789aec46dd1f69af62edcaec2799\"" Apr 12 19:41:46.909178 systemd[1]: Started cri-containerd-acec71d76700ad7228179a535f9f1cdd458e789aec46dd1f69af62edcaec2799.scope. Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.924000 audit: BPF prog-id=195 op=LOAD Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=6430 pid=6536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163656337316437363730306164373232383137396135333566396631 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=6430 pid=6536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163656337316437363730306164373232383137396135333566396631 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit: BPF prog-id=196 op=LOAD Apr 12 19:41:46.925000 audit[6536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=6430 pid=6536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163656337316437363730306164373232383137396135333566396631 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit: BPF prog-id=197 op=LOAD Apr 12 19:41:46.925000 audit[6536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=6430 pid=6536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163656337316437363730306164373232383137396135333566396631 Apr 12 19:41:46.925000 audit: BPF prog-id=197 op=UNLOAD Apr 12 19:41:46.925000 audit: BPF prog-id=196 op=UNLOAD Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { perfmon } for pid=6536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit[6536]: AVC avc: denied { bpf } for pid=6536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:41:46.925000 audit: BPF prog-id=198 op=LOAD Apr 12 19:41:46.925000 audit[6536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=6430 pid=6536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:46.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163656337316437363730306164373232383137396135333566396631 Apr 12 19:41:46.940711 env[2125]: time="2024-04-12T19:41:46.940677357Z" level=info msg="StartContainer for \"acec71d76700ad7228179a535f9f1cdd458e789aec46dd1f69af62edcaec2799\" returns successfully" Apr 12 19:41:47.037419 systemd-networkd[1940]: cali4e7a2bc4b9f: Gained IPv6LL Apr 12 19:41:47.122939 kubelet[3415]: I0412 19:41:47.122914 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65df9f8f6d-bqghm" podStartSLOduration=2.012380675 podStartE2EDuration="3.122853971s" podCreationTimestamp="2024-04-12 19:41:44 +0000 UTC" firstStartedPulling="2024-04-12 19:41:45.717664865 +0000 UTC m=+49.759496620" lastFinishedPulling="2024-04-12 19:41:46.828138121 +0000 UTC m=+50.869969916" observedRunningTime="2024-04-12 19:41:47.12249881 +0000 UTC m=+51.164330565" watchObservedRunningTime="2024-04-12 19:41:47.122853971 +0000 UTC m=+51.164685726" Apr 12 19:41:47.129406 kubelet[3415]: I0412 19:41:47.129384 3415 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65df9f8f6d-f6rqn" podStartSLOduration=1.974654425 podStartE2EDuration="3.129344433s" podCreationTimestamp="2024-04-12 19:41:44 +0000 UTC" firstStartedPulling="2024-04-12 19:41:45.731766798 +0000 UTC m=+49.773598553" lastFinishedPulling="2024-04-12 19:41:46.886456806 +0000 UTC m=+50.928288561" observedRunningTime="2024-04-12 19:41:47.129000151 +0000 UTC m=+51.170831906" watchObservedRunningTime="2024-04-12 19:41:47.129344433 +0000 UTC m=+51.171176188" Apr 12 19:41:47.129000 audit[6588]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=6588 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:47.129000 audit[6588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc6287fe0 a2=0 a3=1 items=0 ppid=3800 pid=6588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:47.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:47.141000 audit[6588]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=6588 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:47.141000 audit[6588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc6287fe0 a2=0 a3=1 items=0 ppid=3800 pid=6588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:47.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:47.154000 audit[6590]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=6590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:47.154000 audit[6590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd35ce670 a2=0 a3=1 items=0 ppid=3800 pid=6590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:47.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:47.161000 audit[6590]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=6590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:41:47.161000 audit[6590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd35ce670 a2=0 a3=1 items=0 ppid=3800 pid=6590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:41:47.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:41:47.708000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:41:47.708000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001703700 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:41:47.708000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:41:47.771000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:41:47.771000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d3c0a0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:41:47.771000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:41:52.263000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:52.274896 kernel: kauditd_printk_skb: 254 callbacks suppressed Apr 12 19:41:52.275069 kernel: audit: type=1400 audit(1712950912.263:1408): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:52.263000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ead380 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:52.374512 kernel: audit: type=1300 audit(1712950912.263:1408): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ead380 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:52.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:52.426259 kernel: audit: type=1327 audit(1712950912.263:1408): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:52.426311 kernel: audit: type=1400 audit(1712950912.263:1409): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:52.263000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:52.263000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b0990 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:52.533988 kernel: audit: type=1300 audit(1712950912.263:1409): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b0990 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:41:52.534052 kernel: audit: type=1327 audit(1712950912.263:1409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:52.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:41:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.213207 kernel: audit: type=1400 audit(1712950913.112:1410): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.213258 kernel: audit: type=1400 audit(1712950913.112:1411): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.213319 kernel: audit: type=1300 audit(1712950913.112:1410): arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4012845ce0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4012845ce0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400864c6f0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.328371 kernel: audit: type=1300 audit(1712950913.112:1411): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400864c6f0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:41:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:41:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4000d41860 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:41:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40087a7770 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:41:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4008276ae0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:41:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:41:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400c23f3a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:41:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:41:56.020417 env[2125]: time="2024-04-12T19:41:56.020375669Z" level=info msg="StopPodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\"" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.052 [WARNING][6651] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad", Pod:"csi-node-driver-srgsc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7086855f8ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.052 [INFO][6651] k8s.go 585: Cleaning up netns ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.052 [INFO][6651] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" iface="eth0" netns="" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.052 [INFO][6651] k8s.go 592: Releasing IP address(es) ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.053 [INFO][6651] utils.go 188: Calico CNI releasing IP address ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.069 [INFO][6669] ipam_plugin.go 415: Releasing address using handleID ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.069 [INFO][6669] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.069 [INFO][6669] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.077 [WARNING][6669] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.077 [INFO][6669] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.078 [INFO][6669] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.080402 env[2125]: 2024-04-12 19:41:56.079 [INFO][6651] k8s.go 598: Teardown processing complete. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.080804 env[2125]: time="2024-04-12T19:41:56.080418380Z" level=info msg="TearDown network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" successfully" Apr 12 19:41:56.080804 env[2125]: time="2024-04-12T19:41:56.080443420Z" level=info msg="StopPodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" returns successfully" Apr 12 19:41:56.080853 env[2125]: time="2024-04-12T19:41:56.080813221Z" level=info msg="RemovePodSandbox for \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\"" Apr 12 19:41:56.080874 env[2125]: time="2024-04-12T19:41:56.080838061Z" level=info msg="Forcibly stopping sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\"" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.111 [WARNING][6702] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"23068c8c-d1e2-4ddd-beb1-96fdc90a60a7", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"3b131d76322f4c56192f84adf9df9c2188b9a38ccb3559cfe1b288087bb0d9ad", Pod:"csi-node-driver-srgsc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7086855f8ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.112 [INFO][6702] k8s.go 585: Cleaning up netns ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.112 [INFO][6702] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" iface="eth0" netns="" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.112 [INFO][6702] k8s.go 592: Releasing IP address(es) ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.112 [INFO][6702] utils.go 188: Calico CNI releasing IP address ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.128 [INFO][6723] ipam_plugin.go 415: Releasing address using handleID ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.129 [INFO][6723] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.129 [INFO][6723] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.136 [WARNING][6723] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.136 [INFO][6723] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" HandleID="k8s-pod-network.9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Workload="ci--3510.3.3--a--f02954802e-k8s-csi--node--driver--srgsc-eth0" Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.137 [INFO][6723] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.139734 env[2125]: 2024-04-12 19:41:56.138 [INFO][6702] k8s.go 598: Teardown processing complete. ContainerID="9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d" Apr 12 19:41:56.140152 env[2125]: time="2024-04-12T19:41:56.139754050Z" level=info msg="TearDown network for sandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" successfully" Apr 12 19:41:56.141556 env[2125]: time="2024-04-12T19:41:56.141535093Z" level=info msg="RemovePodSandbox \"9631077aa17ca864e00440f5d736f3840e0dabea3815217a3caffc46ad04b43d\" returns successfully" Apr 12 19:41:56.141909 env[2125]: time="2024-04-12T19:41:56.141889574Z" level=info msg="StopPodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\"" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.173 [WARNING][6758] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0", GenerateName:"calico-kube-controllers-65f695c545-", Namespace:"calico-system", SelfLink:"", UID:"04e5c2c8-6872-48a1-b19e-63a4748f4f10", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f695c545", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645", Pod:"calico-kube-controllers-65f695c545-dnm6q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.112.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali18867986d1f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.173 [INFO][6758] k8s.go 585: Cleaning up netns ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.174 [INFO][6758] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" iface="eth0" netns="" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.174 [INFO][6758] k8s.go 592: Releasing IP address(es) ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.174 [INFO][6758] utils.go 188: Calico CNI releasing IP address ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.192 [INFO][6779] ipam_plugin.go 415: Releasing address using handleID ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.192 [INFO][6779] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.192 [INFO][6779] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.200 [WARNING][6779] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.200 [INFO][6779] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.201 [INFO][6779] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.203658 env[2125]: 2024-04-12 19:41:56.202 [INFO][6758] k8s.go 598: Teardown processing complete. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.204041 env[2125]: time="2024-04-12T19:41:56.203686528Z" level=info msg="TearDown network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" successfully" Apr 12 19:41:56.204041 env[2125]: time="2024-04-12T19:41:56.203734248Z" level=info msg="StopPodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" returns successfully" Apr 12 19:41:56.204041 env[2125]: time="2024-04-12T19:41:56.203983088Z" level=info msg="RemovePodSandbox for \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\"" Apr 12 19:41:56.204041 env[2125]: time="2024-04-12T19:41:56.204014769Z" level=info msg="Forcibly stopping sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\"" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.235 [WARNING][6813] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0", GenerateName:"calico-kube-controllers-65f695c545-", Namespace:"calico-system", SelfLink:"", UID:"04e5c2c8-6872-48a1-b19e-63a4748f4f10", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f695c545", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"795188273c56e373a38da51fa2feb6306911bfe555e7b6cc8d8d0ed37df6a645", Pod:"calico-kube-controllers-65f695c545-dnm6q", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.112.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali18867986d1f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.235 [INFO][6813] k8s.go 585: Cleaning up netns ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.235 [INFO][6813] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" iface="eth0" netns="" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.235 [INFO][6813] k8s.go 592: Releasing IP address(es) ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.235 [INFO][6813] utils.go 188: Calico CNI releasing IP address ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.253 [INFO][6835] ipam_plugin.go 415: Releasing address using handleID ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.253 [INFO][6835] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.253 [INFO][6835] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.263 [WARNING][6835] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.263 [INFO][6835] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" HandleID="k8s-pod-network.c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Workload="ci--3510.3.3--a--f02954802e-k8s-calico--kube--controllers--65f695c545--dnm6q-eth0" Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.264 [INFO][6835] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.267005 env[2125]: 2024-04-12 19:41:56.265 [INFO][6813] k8s.go 598: Teardown processing complete. ContainerID="c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b" Apr 12 19:41:56.267401 env[2125]: time="2024-04-12T19:41:56.267034645Z" level=info msg="TearDown network for sandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" successfully" Apr 12 19:41:56.268576 env[2125]: time="2024-04-12T19:41:56.268554808Z" level=info msg="RemovePodSandbox \"c9d51f9cbfb2a3b72e70ef8cee82c8a427130dcbc5e35fe0be6f65fbb757205b\" returns successfully" Apr 12 19:41:56.268919 env[2125]: time="2024-04-12T19:41:56.268898288Z" level=info msg="StopPodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\"" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.300 [WARNING][6869] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"962b0aa6-a7c8-42b7-bdca-52648a82dd4a", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c", Pod:"coredns-76f75df574-jz2tk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4047de45549", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.300 [INFO][6869] k8s.go 585: Cleaning up netns ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.300 [INFO][6869] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" iface="eth0" netns="" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.300 [INFO][6869] k8s.go 592: Releasing IP address(es) ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.300 [INFO][6869] utils.go 188: Calico CNI releasing IP address ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.318 [INFO][6886] ipam_plugin.go 415: Releasing address using handleID ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.318 [INFO][6886] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.318 [INFO][6886] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.325 [WARNING][6886] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.325 [INFO][6886] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.326 [INFO][6886] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.329029 env[2125]: 2024-04-12 19:41:56.327 [INFO][6869] k8s.go 598: Teardown processing complete. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.329390 env[2125]: time="2024-04-12T19:41:56.329033999Z" level=info msg="TearDown network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" successfully" Apr 12 19:41:56.329390 env[2125]: time="2024-04-12T19:41:56.329075719Z" level=info msg="StopPodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" returns successfully" Apr 12 19:41:56.329441 env[2125]: time="2024-04-12T19:41:56.329414680Z" level=info msg="RemovePodSandbox for \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\"" Apr 12 19:41:56.329474 env[2125]: time="2024-04-12T19:41:56.329444600Z" level=info msg="Forcibly stopping sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\"" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.359 [WARNING][6922] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"962b0aa6-a7c8-42b7-bdca-52648a82dd4a", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"4f1b951bb01bb3b3d72a492858bfceb685cdebdef3b28916c1c41a651a84390c", Pod:"coredns-76f75df574-jz2tk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4047de45549", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.360 [INFO][6922] k8s.go 585: Cleaning up netns ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.360 [INFO][6922] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" iface="eth0" netns="" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.360 [INFO][6922] k8s.go 592: Releasing IP address(es) ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.360 [INFO][6922] utils.go 188: Calico CNI releasing IP address ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.376 [INFO][6940] ipam_plugin.go 415: Releasing address using handleID ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.377 [INFO][6940] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.377 [INFO][6940] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.384 [WARNING][6940] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.384 [INFO][6940] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" HandleID="k8s-pod-network.6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--jz2tk-eth0" Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.385 [INFO][6940] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.387429 env[2125]: 2024-04-12 19:41:56.386 [INFO][6922] k8s.go 598: Teardown processing complete. ContainerID="6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300" Apr 12 19:41:56.387807 env[2125]: time="2024-04-12T19:41:56.387445987Z" level=info msg="TearDown network for sandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" successfully" Apr 12 19:41:56.388933 env[2125]: time="2024-04-12T19:41:56.388910350Z" level=info msg="RemovePodSandbox \"6132ed946d4abe0d2c4446d0d0660a600a0d0c7db2ee894d16d3266287a9c300\" returns successfully" Apr 12 19:41:56.389318 env[2125]: time="2024-04-12T19:41:56.389295231Z" level=info msg="StopPodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\"" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.421 [WARNING][6973] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64", Pod:"coredns-76f75df574-h7cmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0088c7ec336", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.421 [INFO][6973] k8s.go 585: Cleaning up netns ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.421 [INFO][6973] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" iface="eth0" netns="" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.421 [INFO][6973] k8s.go 592: Releasing IP address(es) ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.421 [INFO][6973] utils.go 188: Calico CNI releasing IP address ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.438 [INFO][6992] ipam_plugin.go 415: Releasing address using handleID ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.438 [INFO][6992] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.438 [INFO][6992] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.446 [WARNING][6992] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.446 [INFO][6992] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.447 [INFO][6992] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.449617 env[2125]: 2024-04-12 19:41:56.448 [INFO][6973] k8s.go 598: Teardown processing complete. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.449991 env[2125]: time="2024-04-12T19:41:56.449642302Z" level=info msg="TearDown network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" successfully" Apr 12 19:41:56.449991 env[2125]: time="2024-04-12T19:41:56.449669782Z" level=info msg="StopPodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" returns successfully" Apr 12 19:41:56.449991 env[2125]: time="2024-04-12T19:41:56.449938583Z" level=info msg="RemovePodSandbox for \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\"" Apr 12 19:41:56.449991 env[2125]: time="2024-04-12T19:41:56.449966223Z" level=info msg="Forcibly stopping sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\"" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.481 [WARNING][7024] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1a8ea956-a6c1-4f3f-8dfe-7cc4dc6c2837", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 41, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-f02954802e", ContainerID:"1bdd15c133cd4230ed8a6a1dba495dea8f7817174f156d9bb5ea70ba57ae4e64", Pod:"coredns-76f75df574-h7cmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.112.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0088c7ec336", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.481 [INFO][7024] k8s.go 585: Cleaning up netns ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.481 [INFO][7024] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" iface="eth0" netns="" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.481 [INFO][7024] k8s.go 592: Releasing IP address(es) ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.481 [INFO][7024] utils.go 188: Calico CNI releasing IP address ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.498 [INFO][7042] ipam_plugin.go 415: Releasing address using handleID ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.498 [INFO][7042] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.498 [INFO][7042] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.505 [WARNING][7042] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.505 [INFO][7042] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" HandleID="k8s-pod-network.8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Workload="ci--3510.3.3--a--f02954802e-k8s-coredns--76f75df574--h7cmc-eth0" Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.506 [INFO][7042] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:41:56.508700 env[2125]: 2024-04-12 19:41:56.507 [INFO][7024] k8s.go 598: Teardown processing complete. ContainerID="8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478" Apr 12 19:41:56.508996 env[2125]: time="2024-04-12T19:41:56.508723171Z" level=info msg="TearDown network for sandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" successfully" Apr 12 19:41:56.510183 env[2125]: time="2024-04-12T19:41:56.510161574Z" level=info msg="RemovePodSandbox \"8001e6fd359963270a27bdb0539a942e6e3af363b04bfc77a6d2b2caf63ca478\" returns successfully" Apr 12 19:42:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.246851 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 19:42:11.247053 kernel: audit: type=1400 audit(1712950931.235:1416): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.335546 kernel: audit: type=1400 audit(1712950931.235:1417): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.379966 kernel: audit: type=1400 audit(1712950931.235:1418): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e39a60 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.438549 kernel: audit: type=1300 audit(1712950931.235:1416): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e39a60 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.438577 kernel: audit: type=1300 audit(1712950931.235:1418): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002cb0640 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002cb0640 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:11.549883 kernel: audit: type=1327 audit(1712950931.235:1416): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:11.549961 kernel: audit: type=1327 audit(1712950931.235:1418): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002f0df00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.661209 kernel: audit: type=1300 audit(1712950931.235:1417): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002f0df00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.661305 kernel: audit: type=1327 audit(1712950931.235:1417): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.758419 kernel: audit: type=1400 audit(1712950931.235:1419): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d16c40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:15.601000 audit[7176]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=7176 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:42:15.601000 audit[7176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe7ed8740 a2=0 a3=1 items=0 ppid=3800 pid=7176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:42:15.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:42:15.617000 audit[7176]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=7176 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:42:15.617000 audit[7176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe7ed8740 a2=0 a3=1 items=0 ppid=3800 pid=7176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:42:15.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:42:15.631000 audit[7178]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=7178 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:42:15.631000 audit[7178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffee38f290 a2=0 a3=1 items=0 ppid=3800 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:42:15.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:42:15.649000 audit[7178]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=7178 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:42:15.649000 audit[7178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffee38f290 a2=0 a3=1 items=0 ppid=3800 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:42:15.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:42:47.707000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:42:47.720571 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 19:42:47.720717 kernel: audit: type=1400 audit(1712950967.707:1424): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:42:47.707000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400050c5e0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:42:47.831555 kernel: audit: type=1300 audit(1712950967.707:1424): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400050c5e0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:42:47.831617 kernel: audit: type=1327 audit(1712950967.707:1424): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:42:47.707000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:42:47.771000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:42:47.939276 kernel: audit: type=1400 audit(1712950967.771:1425): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:42:47.939331 kernel: audit: type=1300 audit(1712950967.771:1425): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001d28c60 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:42:47.771000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001d28c60 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:42:47.771000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:42:48.048849 kernel: audit: type=1327 audit(1712950967.771:1425): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:42:52.263000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:52.263000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:52.361371 kernel: audit: type=1400 audit(1712950972.263:1426): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:52.361547 kernel: audit: type=1400 audit(1712950972.263:1427): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:52.361626 kernel: audit: type=1300 audit(1712950972.263:1427): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d11440 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:52.263000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d11440 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:52.263000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400129ebc0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:52.479018 kernel: audit: type=1300 audit(1712950972.263:1426): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400129ebc0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:42:52.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:52.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:42:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.125561 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:42:53.125731 kernel: audit: type=1400 audit(1712950973.112:1428): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4006e45820 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.227938 kernel: audit: type=1300 audit(1712950973.112:1428): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4006e45820 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.227994 kernel: audit: type=1400 audit(1712950973.112:1429): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.331761 kernel: audit: type=1327 audit(1712950973.112:1428): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.331831 kernel: audit: type=1300 audit(1712950973.112:1429): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400880bd70 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400880bd70 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.442564 kernel: audit: type=1327 audit(1712950973.112:1429): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.442646 kernel: audit: type=1400 audit(1712950973.112:1430): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.112000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.494004 kernel: audit: type=1300 audit(1712950973.112:1430): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400a0754a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.112000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400a0754a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.604864 kernel: audit: type=1327 audit(1712950973.112:1430): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.604924 kernel: audit: type=1400 audit(1712950973.113:1431): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40087a6270 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400a075500 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:42:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:42:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009997000 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:42:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.247988 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:43:11.248179 kernel: audit: type=1400 audit(1712950991.235:1434): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015d9940 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.350844 kernel: audit: type=1300 audit(1712950991.235:1434): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015d9940 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.350911 kernel: audit: type=1327 audit(1712950991.235:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.447889 kernel: audit: type=1400 audit(1712950991.235:1435): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.447947 kernel: audit: type=1300 audit(1712950991.235:1435): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015d9960 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015d9960 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:11.558890 kernel: audit: type=1327 audit(1712950991.235:1435): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:11.558975 kernel: audit: type=1400 audit(1712950991.235:1436): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400129f580 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.661360 kernel: audit: type=1300 audit(1712950991.235:1436): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400129f580 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.661448 kernel: audit: type=1327 audit(1712950991.235:1436): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:11.235000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.758164 kernel: audit: type=1400 audit(1712950991.235:1437): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:11.235000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017952c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:11.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:45.563601 systemd[1]: run-containerd-runc-k8s.io-35ce36212dbbb221dda160db0654962eed8bfbcbdb173814e5d8f767c7da5191-runc.RXiLk7.mount: Deactivated successfully. Apr 12 19:43:47.708000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:43:47.721574 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:43:47.721711 kernel: audit: type=1400 audit(1712951027.708:1438): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:43:47.708000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005441a0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:43:47.832351 kernel: audit: type=1300 audit(1712951027.708:1438): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005441a0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:43:47.832452 kernel: audit: type=1327 audit(1712951027.708:1438): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:43:47.708000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:43:47.771000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:43:47.939906 kernel: audit: type=1400 audit(1712951027.771:1439): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:43:47.940003 kernel: audit: type=1300 audit(1712951027.771:1439): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40020e0560 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:43:47.771000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40020e0560 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:43:47.996235 kernel: audit: type=1327 audit(1712951027.771:1439): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:43:47.771000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:43:52.264000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:52.264000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001795d20 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:52.369021 kernel: audit: type=1400 audit(1712951032.264:1440): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:52.369180 kernel: audit: type=1300 audit(1712951032.264:1440): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001795d20 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:52.369227 kernel: audit: type=1327 audit(1712951032.264:1440): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:52.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:52.264000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:52.473889 kernel: audit: type=1400 audit(1712951032.264:1441): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:52.264000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d10f60 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:43:52.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:43:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.126187 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:43:53.126345 kernel: audit: type=1400 audit(1712951033.113:1442): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=40074f8450 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.234785 kernel: audit: type=1300 audit(1712951033.113:1442): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=40074f8450 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.234860 kernel: audit: type=1327 audit(1712951033.113:1442): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.331861 kernel: audit: type=1400 audit(1712951033.113:1443): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.331928 kernel: audit: type=1300 audit(1712951033.113:1443): arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=40111d3d20 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=40111d3d20 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.442269 kernel: audit: type=1327 audit(1712951033.113:1443): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.442366 kernel: audit: type=1400 audit(1712951033.113:1444): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.545225 kernel: audit: type=1400 audit(1712951033.113:1445): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.545316 kernel: audit: type=1300 audit(1712951033.113:1444): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400894f620 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400894f620 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400a03c2d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.661002 kernel: audit: type=1300 audit(1712951033.113:1445): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400a03c2d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.113000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.113000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400a15b710 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:43:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:43:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=40113bb0c0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:43:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:11.236000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.248787 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:44:11.248948 kernel: audit: type=1400 audit(1712951051.236:1448): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.236000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002207a60 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.351730 kernel: audit: type=1300 audit(1712951051.236:1448): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002207a60 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.351794 kernel: audit: type=1327 audit(1712951051.236:1448): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:11.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:11.236000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.448923 kernel: audit: type=1400 audit(1712951051.236:1449): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.448972 kernel: audit: type=1300 audit(1712951051.236:1449): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001547a00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.236000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001547a00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.507421 kernel: audit: type=1327 audit(1712951051.236:1449): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:11.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:11.239000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.604661 kernel: audit: type=1400 audit(1712951051.239:1450): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.604736 kernel: audit: type=1300 audit(1712951051.239:1450): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400129eb00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.239000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400129eb00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.663114 kernel: audit: type=1327 audit(1712951051.239:1450): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:11.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:11.239000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.760242 kernel: audit: type=1400 audit(1712951051.239:1451): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:11.239000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002c24f80 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:11.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:22.142428 update_engine[2115]: I0412 19:44:22.142378 2115 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 19:44:22.142428 update_engine[2115]: I0412 19:44:22.142421 2115 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 19:44:22.142943 update_engine[2115]: I0412 19:44:22.142858 2115 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 19:44:22.143181 update_engine[2115]: I0412 19:44:22.143170 2115 omaha_request_params.cc:62] Current group set to lts Apr 12 19:44:22.143312 update_engine[2115]: I0412 19:44:22.143304 2115 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 19:44:22.143312 update_engine[2115]: I0412 19:44:22.143309 2115 update_attempter.cc:643] Scheduling an action processor start. Apr 12 19:44:22.143363 update_engine[2115]: I0412 19:44:22.143324 2115 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 19:44:22.143363 update_engine[2115]: I0412 19:44:22.143347 2115 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 19:44:22.143798 update_engine[2115]: I0412 19:44:22.143788 2115 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 19:44:22.143798 update_engine[2115]: I0412 19:44:22.143795 2115 omaha_request_action.cc:271] Request: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143798 update_engine[2115]: Apr 12 19:44:22.143988 update_engine[2115]: I0412 19:44:22.143800 2115 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:44:22.144150 locksmithd[2157]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 19:44:22.144592 update_engine[2115]: I0412 19:44:22.144580 2115 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:44:22.144668 update_engine[2115]: E0412 19:44:22.144660 2115 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:44:22.144720 update_engine[2115]: I0412 19:44:22.144712 2115 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 19:44:32.121284 update_engine[2115]: I0412 19:44:32.121243 2115 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:44:32.121734 update_engine[2115]: I0412 19:44:32.121398 2115 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:44:32.121734 update_engine[2115]: E0412 19:44:32.121464 2115 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:44:32.121734 update_engine[2115]: I0412 19:44:32.121523 2115 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 19:44:42.120639 update_engine[2115]: I0412 19:44:42.120561 2115 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:44:42.120965 update_engine[2115]: I0412 19:44:42.120779 2115 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:44:42.120965 update_engine[2115]: E0412 19:44:42.120854 2115 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:44:42.120965 update_engine[2115]: I0412 19:44:42.120910 2115 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 19:44:47.709000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:44:47.722093 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:44:47.722246 kernel: audit: type=1400 audit(1712951087.709:1452): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:44:47.709000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40007ae080 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:44:47.833120 kernel: audit: type=1300 audit(1712951087.709:1452): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40007ae080 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:44:47.833153 kernel: audit: type=1327 audit(1712951087.709:1452): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:44:47.709000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:44:47.772000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:44:47.940707 kernel: audit: type=1400 audit(1712951087.772:1453): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:44:47.940786 kernel: audit: type=1300 audit(1712951087.772:1453): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000416120 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:44:47.772000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000416120 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:44:47.772000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:44:48.050137 kernel: audit: type=1327 audit(1712951087.772:1453): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:44:52.120999 update_engine[2115]: I0412 19:44:52.120951 2115 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:44:52.121355 update_engine[2115]: I0412 19:44:52.121166 2115 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:44:52.121355 update_engine[2115]: E0412 19:44:52.121237 2115 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:44:52.121355 update_engine[2115]: I0412 19:44:52.121282 2115 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 19:44:52.121355 update_engine[2115]: I0412 19:44:52.121302 2115 omaha_request_action.cc:621] Omaha request response: Apr 12 19:44:52.121448 update_engine[2115]: E0412 19:44:52.121366 2115 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 19:44:52.121448 update_engine[2115]: I0412 19:44:52.121376 2115 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 19:44:52.121448 update_engine[2115]: I0412 19:44:52.121379 2115 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 19:44:52.121448 update_engine[2115]: I0412 19:44:52.121382 2115 update_attempter.cc:306] Processing Done. Apr 12 19:44:52.121448 update_engine[2115]: E0412 19:44:52.121394 2115 update_attempter.cc:619] Update failed. Apr 12 19:44:52.121448 update_engine[2115]: I0412 19:44:52.121397 2115 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 19:44:52.121448 update_engine[2115]: I0412 19:44:52.121399 2115 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 19:44:52.121448 update_engine[2115]: I0412 19:44:52.121402 2115 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 19:44:52.121613 update_engine[2115]: I0412 19:44:52.121461 2115 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 19:44:52.121613 update_engine[2115]: I0412 19:44:52.121479 2115 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 19:44:52.121613 update_engine[2115]: I0412 19:44:52.121481 2115 omaha_request_action.cc:271] Request: Apr 12 19:44:52.121613 update_engine[2115]: Apr 12 19:44:52.121613 update_engine[2115]: Apr 12 19:44:52.121613 update_engine[2115]: Apr 12 19:44:52.121613 update_engine[2115]: Apr 12 19:44:52.121613 update_engine[2115]: Apr 12 19:44:52.121613 update_engine[2115]: Apr 12 19:44:52.121613 update_engine[2115]: I0412 19:44:52.121484 2115 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 19:44:52.121613 update_engine[2115]: I0412 19:44:52.121567 2115 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 19:44:52.121613 update_engine[2115]: E0412 19:44:52.121613 2115 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121654 2115 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121659 2115 omaha_request_action.cc:621] Omaha request response: Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121661 2115 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121665 2115 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121666 2115 update_attempter.cc:306] Processing Done. Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121670 2115 update_attempter.cc:310] Error event sent. Apr 12 19:44:52.121873 update_engine[2115]: I0412 19:44:52.121676 2115 update_check_scheduler.cc:74] Next update check in 48m19s Apr 12 19:44:52.122016 locksmithd[2157]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 19:44:52.122016 locksmithd[2157]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 19:44:52.264000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:52.264000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b16780 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:52.376225 kernel: audit: type=1400 audit(1712951092.264:1454): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:52.376279 kernel: audit: type=1300 audit(1712951092.264:1454): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b16780 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:52.376350 kernel: audit: type=1327 audit(1712951092.264:1454): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:52.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:52.264000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:52.474090 kernel: audit: type=1400 audit(1712951092.264:1455): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:52.264000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002f0db00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:44:52.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:44:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.127165 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:44:53.127370 kernel: audit: type=1400 audit(1712951093.114:1456): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007b596e0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.236541 kernel: audit: type=1300 audit(1712951093.114:1456): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007b596e0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.236566 kernel: audit: type=1327 audit(1712951093.114:1456): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.341340 kernel: audit: type=1400 audit(1712951093.114:1457): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.341404 kernel: audit: type=1300 audit(1712951093.114:1457): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007b59920 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007b59920 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.452476 kernel: audit: type=1327 audit(1712951093.114:1457): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.452570 kernel: audit: type=1400 audit(1712951093.114:1458): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007b59980 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.562462 kernel: audit: type=1300 audit(1712951093.114:1458): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007b59980 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.562544 kernel: audit: type=1327 audit(1712951093.114:1458): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.660109 kernel: audit: type=1400 audit(1712951093.114:1459): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400a682a60 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4008ca8f30 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:44:53.125000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:44:53.125000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400ad21760 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:44:53.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:11.236000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.249326 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:45:11.249550 kernel: audit: type=1400 audit(1712951111.236:1462): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.236000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e38f00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.352711 kernel: audit: type=1300 audit(1712951111.236:1462): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e38f00 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.352779 kernel: audit: type=1327 audit(1712951111.236:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:11.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:11.236000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.450210 kernel: audit: type=1400 audit(1712951111.236:1463): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.450239 kernel: audit: type=1300 audit(1712951111.236:1463): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000504da0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.236000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000504da0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:11.561919 kernel: audit: type=1327 audit(1712951111.236:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:11.561998 kernel: audit: type=1400 audit(1712951111.239:1464): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.239000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.239000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e390c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.664980 kernel: audit: type=1300 audit(1712951111.239:1464): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002e390c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.665024 kernel: audit: type=1327 audit(1712951111.239:1464): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:11.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:11.240000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.762245 kernel: audit: type=1400 audit(1712951111.240:1465): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:11.240000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000504de0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:11.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:15.563948 systemd[1]: run-containerd-runc-k8s.io-35ce36212dbbb221dda160db0654962eed8bfbcbdb173814e5d8f767c7da5191-runc.HpHdWY.mount: Deactivated successfully. Apr 12 19:45:47.710000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:45:47.722988 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:45:47.723136 kernel: audit: type=1400 audit(1712951147.710:1466): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:45:47.710000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40017021e0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:45:47.833871 kernel: audit: type=1300 audit(1712951147.710:1466): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40017021e0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:45:47.833944 kernel: audit: type=1327 audit(1712951147.710:1466): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:45:47.710000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:45:47.773000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:45:47.941314 kernel: audit: type=1400 audit(1712951147.773:1467): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:45:47.941376 kernel: audit: type=1300 audit(1712951147.773:1467): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40004162a0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:45:47.773000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40004162a0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:45:47.773000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:45:48.050732 kernel: audit: type=1327 audit(1712951147.773:1467): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:45:52.264000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:52.264000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014b8460 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:52.369340 kernel: audit: type=1400 audit(1712951152.264:1468): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:52.369406 kernel: audit: type=1300 audit(1712951152.264:1468): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014b8460 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:52.369472 kernel: audit: type=1327 audit(1712951152.264:1468): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:52.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:52.264000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:52.474185 kernel: audit: type=1400 audit(1712951152.264:1469): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:52.264000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a8fa70 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:45:52.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:45:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.127418 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:45:53.127447 kernel: audit: type=1400 audit(1712951153.114:1470): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4008a38cc0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.237138 kernel: audit: type=1300 audit(1712951153.114:1470): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4008a38cc0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.237513 kernel: audit: type=1327 audit(1712951153.114:1470): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.341402 kernel: audit: type=1400 audit(1712951153.114:1472): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.341468 kernel: audit: type=1400 audit(1712951153.114:1471): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.114000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008681ec0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.449996 kernel: audit: type=1300 audit(1712951153.114:1472): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4008681ec0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.450112 kernel: audit: type=1327 audit(1712951153.114:1472): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.114000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4008efd1d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.560585 kernel: audit: type=1300 audit(1712951153.114:1471): arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4008efd1d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.560651 kernel: audit: type=1327 audit(1712951153.114:1471): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.658093 kernel: audit: type=1400 audit(1712951153.115:1473): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=401269c5a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4008681f20 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:45:53.126000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:45:53.126000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4009e53e20 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:45:53.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:11.237000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.250002 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:46:11.250197 kernel: audit: type=1400 audit(1712951171.237:1476): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.237000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014b9480 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.353235 kernel: audit: type=1300 audit(1712951171.237:1476): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40014b9480 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.353310 kernel: audit: type=1327 audit(1712951171.237:1476): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:11.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:11.237000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.450746 kernel: audit: type=1400 audit(1712951171.237:1477): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.450795 kernel: audit: type=1300 audit(1712951171.237:1477): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015d8e40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.237000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015d8e40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:11.562402 kernel: audit: type=1327 audit(1712951171.237:1477): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:11.562493 kernel: audit: type=1400 audit(1712951171.240:1478): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.240000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.240000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a92340 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.665441 kernel: audit: type=1300 audit(1712951171.240:1478): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a92340 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:11.718415 kernel: audit: type=1327 audit(1712951171.240:1478): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:11.718490 kernel: audit: type=1400 audit(1712951171.240:1479): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.240000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:11.240000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028b8620 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:11.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:47.710000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:46:47.723175 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:46:47.723377 kernel: audit: type=1400 audit(1712951207.710:1480): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:46:47.710000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b32160 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:46:47.834142 kernel: audit: type=1300 audit(1712951207.710:1480): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b32160 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:46:47.834185 kernel: audit: type=1327 audit(1712951207.710:1480): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:46:47.710000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:46:47.774000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:46:47.941666 kernel: audit: type=1400 audit(1712951207.774:1481): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:46:47.941723 kernel: audit: type=1300 audit(1712951207.774:1481): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40025920a0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:46:47.774000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40025920a0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:46:47.774000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:46:48.051087 kernel: audit: type=1327 audit(1712951207.774:1481): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:46:52.265000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:52.265000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001800330 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:52.376949 kernel: audit: type=1400 audit(1712951212.265:1482): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:52.377013 kernel: audit: type=1300 audit(1712951212.265:1482): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001800330 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:52.377056 kernel: audit: type=1327 audit(1712951212.265:1482): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:52.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:52.265000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:52.474744 kernel: audit: type=1400 audit(1712951212.265:1483): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:52.265000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400129e980 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:46:52.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:46:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.127894 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:46:53.128093 kernel: audit: type=1400 audit(1712951213.115:1484): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007bfa990 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.237260 kernel: audit: type=1300 audit(1712951213.115:1484): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=4007bfa990 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.237314 kernel: audit: type=1327 audit(1712951213.115:1484): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.342002 kernel: audit: type=1400 audit(1712951213.115:1485): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.342053 kernel: audit: type=1400 audit(1712951213.115:1486): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a075bc0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.451628 kernel: audit: type=1300 audit(1712951213.115:1485): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a075bc0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.451695 kernel: audit: type=1327 audit(1712951213.115:1485): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4009bc4690 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.562744 kernel: audit: type=1300 audit(1712951213.115:1486): arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4009bc4690 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.562789 kernel: audit: type=1327 audit(1712951213.115:1486): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.667859 kernel: audit: type=1400 audit(1712951213.115:1487): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4007bfa9c0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.115000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.115000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4007399b00 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:46:53.127000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:46:53.127000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400672a680 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:46:53.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:11.238000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.251054 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:47:11.251352 kernel: audit: type=1400 audit(1712951231.238:1490): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.238000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b9b40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.353856 kernel: audit: type=1300 audit(1712951231.238:1490): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b9b40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.353932 kernel: audit: type=1327 audit(1712951231.238:1490): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:11.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:11.238000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.450888 kernel: audit: type=1400 audit(1712951231.238:1491): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.450970 kernel: audit: type=1300 audit(1712951231.238:1491): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002f0c720 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.238000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002f0c720 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:11.561955 kernel: audit: type=1327 audit(1712951231.238:1491): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:11.562035 kernel: audit: type=1400 audit(1712951231.241:1492): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.241000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.241000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b9c2a0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.664514 kernel: audit: type=1300 audit(1712951231.241:1492): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b9c2a0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.664585 kernel: audit: type=1327 audit(1712951231.241:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:11.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:11.241000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.761382 kernel: audit: type=1400 audit(1712951231.241:1493): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:11.241000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002b9c300 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:11.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:47.711000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:47:47.723721 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:47:47.723903 kernel: audit: type=1400 audit(1712951267.711:1494): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:47:47.711000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005457c0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:47:47.834581 kernel: audit: type=1300 audit(1712951267.711:1494): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40005457c0 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:47:47.834616 kernel: audit: type=1327 audit(1712951267.711:1494): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:47:47.711000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:47:47.774000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:47:47.942078 kernel: audit: type=1400 audit(1712951267.774:1495): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:47:47.942146 kernel: audit: type=1300 audit(1712951267.774:1495): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40025921c0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:47:47.774000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40025921c0 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:47:47.774000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:47:48.051463 kernel: audit: type=1327 audit(1712951267.774:1495): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:47:52.265000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:52.265000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000504360 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:52.370702 kernel: audit: type=1400 audit(1712951272.265:1496): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:52.370732 kernel: audit: type=1300 audit(1712951272.265:1496): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000504360 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:52.370755 kernel: audit: type=1327 audit(1712951272.265:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:52.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:52.266000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:52.475504 kernel: audit: type=1400 audit(1712951272.266:1497): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:52.266000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001735bc0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:47:52.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:47:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.128831 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:47:53.129013 kernel: audit: type=1400 audit(1712951273.116:1498): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400999f980 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.237940 kernel: audit: type=1300 audit(1712951273.116:1498): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400999f980 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.238006 kernel: audit: type=1327 audit(1712951273.116:1498): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.335026 kernel: audit: type=1400 audit(1712951273.116:1499): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.335069 kernel: audit: type=1300 audit(1712951273.116:1499): arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=401036c2e0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=401036c2e0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.445432 kernel: audit: type=1327 audit(1712951273.116:1499): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.445485 kernel: audit: type=1400 audit(1712951273.116:1500): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.548324 kernel: audit: type=1400 audit(1712951273.116:1501): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.548391 kernel: audit: type=1300 audit(1712951273.116:1500): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4004ef62a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4004ef62a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.659126 kernel: audit: type=1327 audit(1712951273.116:1500): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400999f9e0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.116000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.116000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40126a85d0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.116000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:47:53.127000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:47:53.127000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=401036c480 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:47:53.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:11.238000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.251424 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:48:11.251607 kernel: audit: type=1400 audit(1712951291.238:1504): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.238000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b97e0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.354143 kernel: audit: type=1300 audit(1712951291.238:1504): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b97e0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.354233 kernel: audit: type=1327 audit(1712951291.238:1504): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:11.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:11.238000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.451115 kernel: audit: type=1400 audit(1712951291.238:1505): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.451233 kernel: audit: type=1300 audit(1712951291.238:1505): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002b9df40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.238000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002b9df40 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:11.562162 kernel: audit: type=1327 audit(1712951291.238:1505): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:11.562232 kernel: audit: type=1400 audit(1712951291.242:1506): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.242000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.242000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.650607 kernel: audit: type=1400 audit(1712951291.242:1507): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:11.650678 kernel: audit: type=1300 audit(1712951291.242:1506): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002eac840 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.242000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002eac840 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.708954 kernel: audit: type=1327 audit(1712951291.242:1506): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:11.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:11.242000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015d9980 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:11.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:47.711000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:48:47.723796 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:48:47.723972 kernel: audit: type=1400 audit(1712951327.711:1508): avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:48:47.711000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40007ae080 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:48:47.833853 kernel: audit: type=1300 audit(1712951327.711:1508): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40007ae080 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:48:47.833929 kernel: audit: type=1327 audit(1712951327.711:1508): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:48:47.711000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:48:47.775000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:48:47.940715 kernel: audit: type=1400 audit(1712951327.775:1509): avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:48:47.940784 kernel: audit: type=1300 audit(1712951327.775:1509): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4002592220 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:48:47.775000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4002592220 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:48:47.775000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:48:48.049516 kernel: audit: type=1327 audit(1712951327.775:1509): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:48:52.267000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:52.267000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001795560 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:52.371150 kernel: audit: type=1400 audit(1712951332.267:1510): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:52.371244 kernel: audit: type=1300 audit(1712951332.267:1510): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001795560 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:52.371279 kernel: audit: type=1327 audit(1712951332.267:1510): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:52.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:52.267000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:52.475649 kernel: audit: type=1400 audit(1712951332.267:1511): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:52.267000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40018007e0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:48:52.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:48:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.129817 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 19:48:53.130042 kernel: audit: type=1400 audit(1712951333.117:1512): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=401222f3a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.231849 kernel: audit: type=1300 audit(1712951333.117:1512): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=401222f3a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.231936 kernel: audit: type=1400 audit(1712951333.117:1513): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.335755 kernel: audit: type=1327 audit(1712951333.117:1512): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.335851 kernel: audit: type=1300 audit(1712951333.117:1513): arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4008a42e70 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4008a42e70 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.393452 kernel: audit: type=1327 audit(1712951333.117:1513): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.497876 kernel: audit: type=1400 audit(1712951333.117:1514): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.497937 kernel: audit: type=1300 audit(1712951333.117:1514): arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400ad46ab0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400ad46ab0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.608454 kernel: audit: type=1327 audit(1712951333.117:1514): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.608554 kernel: audit: type=1400 audit(1712951333.117:1515): avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=4011d932f0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4008a42ed0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:48:53.128000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:48:53.128000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5d a1=400013c2a0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:48:53.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:11.238000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.251620 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 19:49:11.251826 kernel: audit: type=1400 audit(1712951351.238:1518): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.238000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001547980 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.354516 kernel: audit: type=1300 audit(1712951351.238:1518): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001547980 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.354571 kernel: audit: type=1327 audit(1712951351.238:1518): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:11.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:11.238000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.238000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b95c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.509888 kernel: audit: type=1400 audit(1712951351.238:1519): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.509926 kernel: audit: type=1300 audit(1712951351.238:1519): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014b95c0 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.509962 kernel: audit: type=1327 audit(1712951351.238:1519): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:11.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:11.242000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.606738 kernel: audit: type=1400 audit(1712951351.242:1520): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.606801 kernel: audit: type=1300 audit(1712951351.242:1520): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d16c20 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.242000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d16c20 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:11.717611 kernel: audit: type=1327 audit(1712951351.242:1520): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:11.717663 kernel: audit: type=1400 audit(1712951351.242:1521): avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.242000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:11.242000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a92780 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:11.242000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:13.753142 systemd[1]: Started sshd@7-147.75.62.230:22-139.178.89.65:37452.service. Apr 12 19:49:13.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.62.230:22-139.178.89.65:37452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:14.215000 audit[8975]: USER_ACCT pid=8975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.217122 sshd[8975]: Accepted publickey for core from 139.178.89.65 port 37452 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:14.216000 audit[8975]: CRED_ACQ pid=8975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.216000 audit[8975]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff95aba00 a2=3 a3=1 items=0 ppid=1 pid=8975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:14.216000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:14.218222 sshd[8975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:14.221351 systemd-logind[2114]: New session 10 of user core. Apr 12 19:49:14.222488 systemd[1]: Started session-10.scope. Apr 12 19:49:14.223000 audit[8975]: USER_START pid=8975 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.225000 audit[8977]: CRED_ACQ pid=8977 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.610136 sshd[8975]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:14.609000 audit[8975]: USER_END pid=8975 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.609000 audit[8975]: CRED_DISP pid=8975 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.612275 systemd[1]: sshd@7-147.75.62.230:22-139.178.89.65:37452.service: Deactivated successfully. Apr 12 19:49:14.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.62.230:22-139.178.89.65:37452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:14.613028 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 19:49:14.613485 systemd-logind[2114]: Session 10 logged out. Waiting for processes to exit. Apr 12 19:49:14.613964 systemd-logind[2114]: Removed session 10. Apr 12 19:49:19.682879 systemd[1]: Started sshd@8-147.75.62.230:22-139.178.89.65:32900.service. Apr 12 19:49:19.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.62.230:22-139.178.89.65:32900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:19.694712 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 19:49:19.694908 kernel: audit: type=1130 audit(1712951359.681:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.62.230:22-139.178.89.65:32900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:20.136000 audit[9055]: USER_ACCT pid=9055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.137922 sshd[9055]: Accepted publickey for core from 139.178.89.65 port 32900 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:20.139877 sshd[9055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:20.144516 systemd-logind[2114]: New session 11 of user core. Apr 12 19:49:20.145755 systemd[1]: Started session-11.scope. Apr 12 19:49:20.138000 audit[9055]: CRED_ACQ pid=9055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.235234 kernel: audit: type=1101 audit(1712951360.136:1532): pid=9055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.235300 kernel: audit: type=1103 audit(1712951360.138:1533): pid=9055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.235343 kernel: audit: type=1006 audit(1712951360.138:1534): pid=9055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 19:49:20.138000 audit[9055]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc6d67c0 a2=3 a3=1 items=0 ppid=1 pid=9055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:20.316000 kernel: audit: type=1300 audit(1712951360.138:1534): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc6d67c0 a2=3 a3=1 items=0 ppid=1 pid=9055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:20.316095 kernel: audit: type=1327 audit(1712951360.138:1534): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:20.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:20.146000 audit[9055]: USER_START pid=9055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.393013 kernel: audit: type=1105 audit(1712951360.146:1535): pid=9055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.393110 kernel: audit: type=1103 audit(1712951360.149:1536): pid=9057 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.149000 audit[9057]: CRED_ACQ pid=9057 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.524438 sshd[9055]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:20.523000 audit[9055]: USER_END pid=9055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.528685 systemd[1]: sshd@8-147.75.62.230:22-139.178.89.65:32900.service: Deactivated successfully. Apr 12 19:49:20.529836 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 19:49:20.530284 systemd-logind[2114]: Session 11 logged out. Waiting for processes to exit. Apr 12 19:49:20.530743 systemd-logind[2114]: Removed session 11. Apr 12 19:49:20.523000 audit[9055]: CRED_DISP pid=9055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.604959 systemd[1]: Started sshd@9-147.75.62.230:22-139.178.89.65:32912.service. Apr 12 19:49:20.624923 kernel: audit: type=1106 audit(1712951360.523:1537): pid=9055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.624969 kernel: audit: type=1104 audit(1712951360.523:1538): pid=9055 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:20.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.62.230:22-139.178.89.65:32900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:20.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.62.230:22-139.178.89.65:32912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:21.061000 audit[9092]: USER_ACCT pid=9092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:21.063195 sshd[9092]: Accepted publickey for core from 139.178.89.65 port 32912 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:21.062000 audit[9092]: CRED_ACQ pid=9092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:21.062000 audit[9092]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4d6f4c0 a2=3 a3=1 items=0 ppid=1 pid=9092 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:21.062000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:21.064181 sshd[9092]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:21.066731 systemd-logind[2114]: New session 12 of user core. Apr 12 19:49:21.067770 systemd[1]: Started session-12.scope. Apr 12 19:49:21.069000 audit[9092]: USER_START pid=9092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:21.070000 audit[9095]: CRED_ACQ pid=9095 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:21.472684 sshd[9092]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:21.471000 audit[9092]: USER_END pid=9092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:21.472000 audit[9092]: CRED_DISP pid=9092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:21.474634 systemd[1]: sshd@9-147.75.62.230:22-139.178.89.65:32912.service: Deactivated successfully. Apr 12 19:49:21.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.62.230:22-139.178.89.65:32912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:21.475549 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 19:49:21.475975 systemd-logind[2114]: Session 12 logged out. Waiting for processes to exit. Apr 12 19:49:21.476400 systemd-logind[2114]: Removed session 12. Apr 12 19:49:21.548621 systemd[1]: Started sshd@10-147.75.62.230:22-139.178.89.65:32920.service. Apr 12 19:49:21.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.62.230:22-139.178.89.65:32920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:22.004000 audit[9127]: USER_ACCT pid=9127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:22.005770 sshd[9127]: Accepted publickey for core from 139.178.89.65 port 32920 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:22.005000 audit[9127]: CRED_ACQ pid=9127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:22.005000 audit[9127]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed9a5e50 a2=3 a3=1 items=0 ppid=1 pid=9127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:22.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:22.006721 sshd[9127]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:22.009217 systemd-logind[2114]: New session 13 of user core. Apr 12 19:49:22.010321 systemd[1]: Started session-13.scope. Apr 12 19:49:22.011000 audit[9127]: USER_START pid=9127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:22.012000 audit[9129]: CRED_ACQ pid=9129 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:22.389694 sshd[9127]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:22.389000 audit[9127]: USER_END pid=9127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:22.389000 audit[9127]: CRED_DISP pid=9127 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:22.391747 systemd[1]: sshd@10-147.75.62.230:22-139.178.89.65:32920.service: Deactivated successfully. Apr 12 19:49:22.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.62.230:22-139.178.89.65:32920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:22.392544 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 19:49:22.393000 systemd-logind[2114]: Session 13 logged out. Waiting for processes to exit. Apr 12 19:49:22.393455 systemd-logind[2114]: Removed session 13. Apr 12 19:49:27.466338 systemd[1]: Started sshd@11-147.75.62.230:22-139.178.89.65:34484.service. Apr 12 19:49:27.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.62.230:22-139.178.89.65:34484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:27.478164 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 19:49:27.478364 kernel: audit: type=1130 audit(1712951367.465:1558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.62.230:22-139.178.89.65:34484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:27.930000 audit[9167]: USER_ACCT pid=9167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:27.932094 sshd[9167]: Accepted publickey for core from 139.178.89.65 port 34484 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:27.933975 sshd[9167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:27.938554 systemd-logind[2114]: New session 14 of user core. Apr 12 19:49:27.939818 systemd[1]: Started session-14.scope. Apr 12 19:49:27.932000 audit[9167]: CRED_ACQ pid=9167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.029504 kernel: audit: type=1101 audit(1712951367.930:1559): pid=9167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.029572 kernel: audit: type=1103 audit(1712951367.932:1560): pid=9167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.029634 kernel: audit: type=1006 audit(1712951367.932:1561): pid=9167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 19:49:27.932000 audit[9167]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9a54070 a2=3 a3=1 items=0 ppid=1 pid=9167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:28.110320 kernel: audit: type=1300 audit(1712951367.932:1561): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9a54070 a2=3 a3=1 items=0 ppid=1 pid=9167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:28.110398 kernel: audit: type=1327 audit(1712951367.932:1561): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:27.932000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:27.941000 audit[9167]: USER_START pid=9167 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.187224 kernel: audit: type=1105 audit(1712951367.941:1562): pid=9167 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.187275 kernel: audit: type=1103 audit(1712951367.943:1563): pid=9169 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:27.943000 audit[9169]: CRED_ACQ pid=9169 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.329549 sshd[9167]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:28.329000 audit[9167]: USER_END pid=9167 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.334637 systemd[1]: sshd@11-147.75.62.230:22-139.178.89.65:34484.service: Deactivated successfully. Apr 12 19:49:28.335772 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 19:49:28.336239 systemd-logind[2114]: Session 14 logged out. Waiting for processes to exit. Apr 12 19:49:28.336718 systemd-logind[2114]: Removed session 14. Apr 12 19:49:28.329000 audit[9167]: CRED_DISP pid=9167 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.430112 kernel: audit: type=1106 audit(1712951368.329:1564): pid=9167 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.430138 kernel: audit: type=1104 audit(1712951368.329:1565): pid=9167 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:28.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.62.230:22-139.178.89.65:34484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:33.405766 systemd[1]: Started sshd@12-147.75.62.230:22-139.178.89.65:34490.service. Apr 12 19:49:33.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.62.230:22-139.178.89.65:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:33.417537 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:49:33.417722 kernel: audit: type=1130 audit(1712951373.404:1567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.62.230:22-139.178.89.65:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:33.871000 audit[9228]: USER_ACCT pid=9228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:33.873675 sshd[9228]: Accepted publickey for core from 139.178.89.65 port 34490 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:33.875487 sshd[9228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:33.880327 systemd-logind[2114]: New session 15 of user core. Apr 12 19:49:33.881541 systemd[1]: Started session-15.scope. Apr 12 19:49:33.873000 audit[9228]: CRED_ACQ pid=9228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:33.971107 kernel: audit: type=1101 audit(1712951373.871:1568): pid=9228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:33.971171 kernel: audit: type=1103 audit(1712951373.873:1569): pid=9228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:33.971259 kernel: audit: type=1006 audit(1712951373.873:1570): pid=9228 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 19:49:33.873000 audit[9228]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc807940 a2=3 a3=1 items=0 ppid=1 pid=9228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.051853 kernel: audit: type=1300 audit(1712951373.873:1570): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc807940 a2=3 a3=1 items=0 ppid=1 pid=9228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:33.873000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:34.073296 kernel: audit: type=1327 audit(1712951373.873:1570): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:33.882000 audit[9228]: USER_START pid=9228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.128750 kernel: audit: type=1105 audit(1712951373.882:1571): pid=9228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.128791 kernel: audit: type=1103 audit(1712951373.885:1572): pid=9230 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:33.885000 audit[9230]: CRED_ACQ pid=9230 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.267296 sshd[9228]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:34.266000 audit[9228]: USER_END pid=9228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.271628 systemd[1]: sshd@12-147.75.62.230:22-139.178.89.65:34490.service: Deactivated successfully. Apr 12 19:49:34.272736 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 19:49:34.273188 systemd-logind[2114]: Session 15 logged out. Waiting for processes to exit. Apr 12 19:49:34.273671 systemd-logind[2114]: Removed session 15. Apr 12 19:49:34.266000 audit[9228]: CRED_DISP pid=9228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.367177 kernel: audit: type=1106 audit(1712951374.266:1573): pid=9228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.367226 kernel: audit: type=1104 audit(1712951374.266:1574): pid=9228 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:34.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.62.230:22-139.178.89.65:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:39.339935 systemd[1]: Started sshd@13-147.75.62.230:22-139.178.89.65:52544.service. Apr 12 19:49:39.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.62.230:22-139.178.89.65:52544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:39.351662 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:49:39.351829 kernel: audit: type=1130 audit(1712951379.338:1576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.62.230:22-139.178.89.65:52544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:39.794000 audit[9308]: USER_ACCT pid=9308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:39.796077 sshd[9308]: Accepted publickey for core from 139.178.89.65 port 52544 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:39.797980 sshd[9308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:39.802659 systemd-logind[2114]: New session 16 of user core. Apr 12 19:49:39.803927 systemd[1]: Started session-16.scope. Apr 12 19:49:39.796000 audit[9308]: CRED_ACQ pid=9308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:39.893785 kernel: audit: type=1101 audit(1712951379.794:1577): pid=9308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:39.893822 kernel: audit: type=1103 audit(1712951379.796:1578): pid=9308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:39.893881 kernel: audit: type=1006 audit(1712951379.796:1579): pid=9308 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 19:49:39.796000 audit[9308]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcf74e90 a2=3 a3=1 items=0 ppid=1 pid=9308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:39.974520 kernel: audit: type=1300 audit(1712951379.796:1579): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcf74e90 a2=3 a3=1 items=0 ppid=1 pid=9308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:39.974595 kernel: audit: type=1327 audit(1712951379.796:1579): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:39.796000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:39.805000 audit[9308]: USER_START pid=9308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.051318 kernel: audit: type=1105 audit(1712951379.805:1580): pid=9308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.051352 kernel: audit: type=1103 audit(1712951379.807:1581): pid=9312 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:39.807000 audit[9312]: CRED_ACQ pid=9312 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.184510 sshd[9308]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:40.183000 audit[9308]: USER_END pid=9308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.188739 systemd[1]: sshd@13-147.75.62.230:22-139.178.89.65:52544.service: Deactivated successfully. Apr 12 19:49:40.189871 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 19:49:40.190336 systemd-logind[2114]: Session 16 logged out. Waiting for processes to exit. Apr 12 19:49:40.190834 systemd-logind[2114]: Removed session 16. Apr 12 19:49:40.183000 audit[9308]: CRED_DISP pid=9308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.262909 systemd[1]: Started sshd@14-147.75.62.230:22-139.178.89.65:52548.service. Apr 12 19:49:40.284388 kernel: audit: type=1106 audit(1712951380.183:1582): pid=9308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.284454 kernel: audit: type=1104 audit(1712951380.183:1583): pid=9308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.62.230:22-139.178.89.65:52544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:40.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.62.230:22-139.178.89.65:52548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:40.727000 audit[9330]: USER_ACCT pid=9330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.729351 sshd[9330]: Accepted publickey for core from 139.178.89.65 port 52548 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:40.728000 audit[9330]: CRED_ACQ pid=9330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.728000 audit[9330]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdf397d0 a2=3 a3=1 items=0 ppid=1 pid=9330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:40.728000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:40.730374 sshd[9330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:40.732981 systemd-logind[2114]: New session 17 of user core. Apr 12 19:49:40.734024 systemd[1]: Started session-17.scope. Apr 12 19:49:40.735000 audit[9330]: USER_START pid=9330 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:40.736000 audit[9332]: CRED_ACQ pid=9332 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:41.161834 sshd[9330]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:41.161000 audit[9330]: USER_END pid=9330 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:41.161000 audit[9330]: CRED_DISP pid=9330 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:41.163814 systemd[1]: sshd@14-147.75.62.230:22-139.178.89.65:52548.service: Deactivated successfully. Apr 12 19:49:41.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.62.230:22-139.178.89.65:52548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:41.164578 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 19:49:41.165025 systemd-logind[2114]: Session 17 logged out. Waiting for processes to exit. Apr 12 19:49:41.165488 systemd-logind[2114]: Removed session 17. Apr 12 19:49:41.235807 systemd[1]: Started sshd@15-147.75.62.230:22-139.178.89.65:52558.service. Apr 12 19:49:41.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.62.230:22-139.178.89.65:52558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:41.688000 audit[9359]: USER_ACCT pid=9359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:41.690372 sshd[9359]: Accepted publickey for core from 139.178.89.65 port 52558 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:41.689000 audit[9359]: CRED_ACQ pid=9359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:41.689000 audit[9359]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd961180 a2=3 a3=1 items=0 ppid=1 pid=9359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:41.689000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:41.691340 sshd[9359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:41.693935 systemd-logind[2114]: New session 18 of user core. Apr 12 19:49:41.694966 systemd[1]: Started session-18.scope. Apr 12 19:49:41.696000 audit[9359]: USER_START pid=9359 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:41.697000 audit[9361]: CRED_ACQ pid=9361 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:42.992000 audit[9451]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=9451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:42.992000 audit[9451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe4e5aaa0 a2=0 a3=1 items=0 ppid=3800 pid=9451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:42.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.007000 audit[9451]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=9451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.007000 audit[9451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4e5aaa0 a2=0 a3=1 items=0 ppid=3800 pid=9451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.026000 audit[9457]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=9457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.026000 audit[9457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff75ae440 a2=0 a3=1 items=0 ppid=3800 pid=9457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.026000 audit[9457]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=9457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.026000 audit[9457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff75ae440 a2=0 a3=1 items=0 ppid=3800 pid=9457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.073055 sshd[9359]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:43.072000 audit[9359]: USER_END pid=9359 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:43.072000 audit[9359]: CRED_DISP pid=9359 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:43.075135 systemd[1]: sshd@15-147.75.62.230:22-139.178.89.65:52558.service: Deactivated successfully. Apr 12 19:49:43.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.62.230:22-139.178.89.65:52558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:43.075877 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 19:49:43.076087 systemd[1]: session-18.scope: Consumed 2.865s CPU time. Apr 12 19:49:43.076370 systemd-logind[2114]: Session 18 logged out. Waiting for processes to exit. Apr 12 19:49:43.076861 systemd-logind[2114]: Removed session 18. Apr 12 19:49:43.147155 systemd[1]: Started sshd@16-147.75.62.230:22-139.178.89.65:52570.service. Apr 12 19:49:43.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.62.230:22-139.178.89.65:52570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:43.600000 audit[9461]: USER_ACCT pid=9461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:43.601984 sshd[9461]: Accepted publickey for core from 139.178.89.65 port 52570 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:43.601000 audit[9461]: CRED_ACQ pid=9461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:43.601000 audit[9461]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc89a0dc0 a2=3 a3=1 items=0 ppid=1 pid=9461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:43.603054 sshd[9461]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:43.605839 systemd-logind[2114]: New session 19 of user core. Apr 12 19:49:43.606941 systemd[1]: Started session-19.scope. Apr 12 19:49:43.608000 audit[9461]: USER_START pid=9461 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:43.609000 audit[9463]: CRED_ACQ pid=9463 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.074410 sshd[9461]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:44.073000 audit[9461]: USER_END pid=9461 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.073000 audit[9461]: CRED_DISP pid=9461 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.076479 systemd[1]: sshd@16-147.75.62.230:22-139.178.89.65:52570.service: Deactivated successfully. Apr 12 19:49:44.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.62.230:22-139.178.89.65:52570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:44.077232 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 19:49:44.077664 systemd-logind[2114]: Session 19 logged out. Waiting for processes to exit. Apr 12 19:49:44.078125 systemd-logind[2114]: Removed session 19. Apr 12 19:49:44.148751 systemd[1]: Started sshd@17-147.75.62.230:22-139.178.89.65:52574.service. Apr 12 19:49:44.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.62.230:22-139.178.89.65:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:44.604000 audit[9510]: USER_ACCT pid=9510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.606567 sshd[9510]: Accepted publickey for core from 139.178.89.65 port 52574 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:44.608536 sshd[9510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:44.613190 systemd-logind[2114]: New session 20 of user core. Apr 12 19:49:44.614345 systemd[1]: Started session-20.scope. Apr 12 19:49:44.617985 kernel: kauditd_printk_skb: 47 callbacks suppressed Apr 12 19:49:44.618201 kernel: audit: type=1101 audit(1712951384.604:1617): pid=9510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.606000 audit[9510]: CRED_ACQ pid=9510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.714939 kernel: audit: type=1103 audit(1712951384.606:1618): pid=9510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.715003 kernel: audit: type=1006 audit(1712951384.606:1619): pid=9510 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 19:49:44.606000 audit[9510]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea3bade0 a2=3 a3=1 items=0 ppid=1 pid=9510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:44.795744 kernel: audit: type=1300 audit(1712951384.606:1619): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea3bade0 a2=3 a3=1 items=0 ppid=1 pid=9510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:44.795806 kernel: audit: type=1327 audit(1712951384.606:1619): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:44.606000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:44.615000 audit[9510]: USER_START pid=9510 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.872946 kernel: audit: type=1105 audit(1712951384.615:1620): pid=9510 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.873012 kernel: audit: type=1103 audit(1712951384.617:1621): pid=9513 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.617000 audit[9513]: CRED_ACQ pid=9513 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.987767 sshd[9510]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:44.987000 audit[9510]: USER_END pid=9510 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:44.992041 systemd[1]: sshd@17-147.75.62.230:22-139.178.89.65:52574.service: Deactivated successfully. Apr 12 19:49:44.993100 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 19:49:44.993552 systemd-logind[2114]: Session 20 logged out. Waiting for processes to exit. Apr 12 19:49:44.994017 systemd-logind[2114]: Removed session 20. Apr 12 19:49:44.987000 audit[9510]: CRED_DISP pid=9510 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:45.087505 kernel: audit: type=1106 audit(1712951384.987:1622): pid=9510 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:45.087603 kernel: audit: type=1104 audit(1712951384.987:1623): pid=9510 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:45.087663 kernel: audit: type=1131 audit(1712951384.991:1624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.62.230:22-139.178.89.65:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:44.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.62.230:22-139.178.89.65:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:47.711000 audit[6501]: AVC avc: denied { watch } for pid=6501 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.2401206407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c170,c313 tclass=file permissive=0 Apr 12 19:49:47.711000 audit[6501]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400039a040 a2=fc6 a3=0 items=0 ppid=6385 pid=6501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c170,c313 key=(null) Apr 12 19:49:47.711000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:49:47.775000 audit[6551]: AVC avc: denied { watch } for pid=6551 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_19_41_45.1344074896/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c673,c780 tclass=file permissive=0 Apr 12 19:49:47.775000 audit[6551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4002592a60 a2=fc6 a3=0 items=0 ppid=6430 pid=6551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c673,c780 key=(null) Apr 12 19:49:47.775000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 19:49:48.946000 audit[9585]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=9585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:48.946000 audit[9585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcc6418d0 a2=0 a3=1 items=0 ppid=3800 pid=9585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:48.963000 audit[9585]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=9585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:48.963000 audit[9585]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffcc6418d0 a2=0 a3=1 items=0 ppid=3800 pid=9585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:50.063038 systemd[1]: Started sshd@18-147.75.62.230:22-139.178.89.65:58768.service. Apr 12 19:49:50.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.62.230:22-139.178.89.65:58768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:50.074824 kernel: kauditd_printk_skb: 12 callbacks suppressed Apr 12 19:49:50.075046 kernel: audit: type=1130 audit(1712951390.061:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.62.230:22-139.178.89.65:58768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:50.524000 audit[9588]: USER_ACCT pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.526320 sshd[9588]: Accepted publickey for core from 139.178.89.65 port 58768 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:50.528292 sshd[9588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:50.532869 systemd-logind[2114]: New session 21 of user core. Apr 12 19:49:50.534110 systemd[1]: Started session-21.scope. Apr 12 19:49:50.526000 audit[9588]: CRED_ACQ pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.623665 kernel: audit: type=1101 audit(1712951390.524:1630): pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.623730 kernel: audit: type=1103 audit(1712951390.526:1631): pid=9588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.623763 kernel: audit: type=1006 audit(1712951390.526:1632): pid=9588 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 19:49:50.526000 audit[9588]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecf47990 a2=3 a3=1 items=0 ppid=1 pid=9588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:50.704315 kernel: audit: type=1300 audit(1712951390.526:1632): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecf47990 a2=3 a3=1 items=0 ppid=1 pid=9588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:50.704383 kernel: audit: type=1327 audit(1712951390.526:1632): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:50.526000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:50.535000 audit[9588]: USER_START pid=9588 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.781157 kernel: audit: type=1105 audit(1712951390.535:1633): pid=9588 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.537000 audit[9590]: CRED_ACQ pid=9590 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.826316 kernel: audit: type=1103 audit(1712951390.537:1634): pid=9590 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.921903 sshd[9588]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:50.921000 audit[9588]: USER_END pid=9588 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.926259 systemd[1]: sshd@18-147.75.62.230:22-139.178.89.65:58768.service: Deactivated successfully. Apr 12 19:49:50.927389 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 19:49:50.927857 systemd-logind[2114]: Session 21 logged out. Waiting for processes to exit. Apr 12 19:49:50.928346 systemd-logind[2114]: Removed session 21. Apr 12 19:49:50.921000 audit[9588]: CRED_DISP pid=9588 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:51.021715 kernel: audit: type=1106 audit(1712951390.921:1635): pid=9588 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:51.021742 kernel: audit: type=1104 audit(1712951390.921:1636): pid=9588 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:50.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.62.230:22-139.178.89.65:58768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:52.267000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:52.267000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028b0b10 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:52.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:52.267000 audit[3155]: AVC avc: denied { watch } for pid=3155 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:52.267000 audit[3155]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000e6f080 a2=fc6 a3=0 items=0 ppid=3006 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c89,c805 key=(null) Apr 12 19:49:52.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 19:49:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=526919 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400e6b3040 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:49:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=40117f6750 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:49:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4011c155f0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:49:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=526925 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40122107b0 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:49:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:53.117000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=526923 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:53.117000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400a14a420 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:49:53.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:53.129000 audit[3156]: AVC avc: denied { watch } for pid=3156 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=526917 scontext=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 19:49:53.129000 audit[3156]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400ed1c340 a2=fc6 a3=0 items=0 ppid=3007 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c688,c856 key=(null) Apr 12 19:49:53.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E36322E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Apr 12 19:49:55.996920 systemd[1]: Started sshd@19-147.75.62.230:22-139.178.89.65:58784.service. Apr 12 19:49:55.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.62.230:22-139.178.89.65:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:56.008789 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 19:49:56.008978 kernel: audit: type=1130 audit(1712951395.995:1646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.62.230:22-139.178.89.65:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:56.449000 audit[9635]: USER_ACCT pid=9635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.451294 sshd[9635]: Accepted publickey for core from 139.178.89.65 port 58784 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:56.453312 sshd[9635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:56.457632 systemd-logind[2114]: New session 22 of user core. Apr 12 19:49:56.458870 systemd[1]: Started session-22.scope. Apr 12 19:49:56.451000 audit[9635]: CRED_ACQ pid=9635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.548666 kernel: audit: type=1101 audit(1712951396.449:1647): pid=9635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.548700 kernel: audit: type=1103 audit(1712951396.451:1648): pid=9635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.548732 kernel: audit: type=1006 audit(1712951396.451:1649): pid=9635 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 19:49:56.451000 audit[9635]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6e7de00 a2=3 a3=1 items=0 ppid=1 pid=9635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:56.629442 kernel: audit: type=1300 audit(1712951396.451:1649): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6e7de00 a2=3 a3=1 items=0 ppid=1 pid=9635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:56.451000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:56.650900 kernel: audit: type=1327 audit(1712951396.451:1649): proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:56.650957 kernel: audit: type=1105 audit(1712951396.460:1650): pid=9635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.460000 audit[9635]: USER_START pid=9635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.462000 audit[9639]: CRED_ACQ pid=9639 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.750883 kernel: audit: type=1103 audit(1712951396.462:1651): pid=9639 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.836888 sshd[9635]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:56.836000 audit[9635]: USER_END pid=9635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.841210 systemd[1]: sshd@19-147.75.62.230:22-139.178.89.65:58784.service: Deactivated successfully. Apr 12 19:49:56.842328 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 19:49:56.842781 systemd-logind[2114]: Session 22 logged out. Waiting for processes to exit. Apr 12 19:49:56.843270 systemd-logind[2114]: Removed session 22. Apr 12 19:49:56.836000 audit[9635]: CRED_DISP pid=9635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.936674 kernel: audit: type=1106 audit(1712951396.836:1652): pid=9635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.936703 kernel: audit: type=1104 audit(1712951396.836:1653): pid=9635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:56.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.62.230:22-139.178.89.65:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:50:01.915648 systemd[1]: Started sshd@20-147.75.62.230:22-139.178.89.65:36420.service. Apr 12 19:50:01.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.62.230:22-139.178.89.65:36420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:50:01.927326 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:50:01.927528 kernel: audit: type=1130 audit(1712951401.914:1655): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.62.230:22-139.178.89.65:36420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:50:02.381000 audit[9692]: USER_ACCT pid=9692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.383261 sshd[9692]: Accepted publickey for core from 139.178.89.65 port 36420 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:50:02.385308 sshd[9692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:50:02.390061 systemd-logind[2114]: New session 23 of user core. Apr 12 19:50:02.391316 systemd[1]: Started session-23.scope. Apr 12 19:50:02.383000 audit[9692]: CRED_ACQ pid=9692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.480690 kernel: audit: type=1101 audit(1712951402.381:1656): pid=9692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.480722 kernel: audit: type=1103 audit(1712951402.383:1657): pid=9692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.480781 kernel: audit: type=1006 audit(1712951402.383:1658): pid=9692 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 19:50:02.383000 audit[9692]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb3c4fe0 a2=3 a3=1 items=0 ppid=1 pid=9692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:02.561390 kernel: audit: type=1300 audit(1712951402.383:1658): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb3c4fe0 a2=3 a3=1 items=0 ppid=1 pid=9692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:02.561446 kernel: audit: type=1327 audit(1712951402.383:1658): proctitle=737368643A20636F7265205B707269765D Apr 12 19:50:02.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:50:02.392000 audit[9692]: USER_START pid=9692 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.638146 kernel: audit: type=1105 audit(1712951402.392:1659): pid=9692 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.638202 kernel: audit: type=1103 audit(1712951402.394:1660): pid=9694 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.394000 audit[9694]: CRED_ACQ pid=9694 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.784783 sshd[9692]: pam_unix(sshd:session): session closed for user core Apr 12 19:50:02.784000 audit[9692]: USER_END pid=9692 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.789175 systemd[1]: sshd@20-147.75.62.230:22-139.178.89.65:36420.service: Deactivated successfully. Apr 12 19:50:02.790290 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 19:50:02.790768 systemd-logind[2114]: Session 23 logged out. Waiting for processes to exit. Apr 12 19:50:02.791274 systemd-logind[2114]: Removed session 23. Apr 12 19:50:02.784000 audit[9692]: CRED_DISP pid=9692 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.884865 kernel: audit: type=1106 audit(1712951402.784:1661): pid=9692 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.884896 kernel: audit: type=1104 audit(1712951402.784:1662): pid=9692 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:50:02.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.62.230:22-139.178.89.65:36420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'